00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000280), &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000680)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) 10:41:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f000025d000)=0x1, 0x1000) 10:41:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x6, 0x0) 10:41:43 executing program 1: unshare(0x20400) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 10:41:43 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x15, 0x0, 0x0, "22947f42a3c38ca118b35ad649702075"}, 0x15, 0x0) prctl$void(0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f0000000080)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000db2000/0x3000)=nil) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) 10:41:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x6, 0x0) 10:41:43 executing program 1: unshare(0x20400) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 10:41:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x6, 0x0) 10:41:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000100)=0x1c, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000004c0)={0x0, 'bpq0\x00'}, 0x18) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @dev}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000880)) pipe(&(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") accept4(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000180)=0x80, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) shutdown(0xffffffffffffffff, 0x0) 10:41:43 executing program 1: unshare(0x20400) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 10:41:43 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018100000000000000007000000000000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000140)='sit0\x00') 10:41:43 executing program 2: getuid() unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/181) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000280), &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000680)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) 10:41:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x6, 0x0) 10:41:43 executing program 1: unshare(0x20400) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 10:41:43 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018100000000000000007000000000000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000140)='sit0\x00') 10:41:44 executing program 0: semget(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 10:41:44 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x15, 0x0, 0x0, "22947f42a3c38ca118b35ad649702075"}, 0x15, 0x0) prctl$void(0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f0000000080)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000db2000/0x3000)=nil) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) 10:41:44 executing program 1: semget(0xffffffffffffffff, 0x1, 0x0) semop(0x0, &(0x7f0000000340), 0x0) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000009c0)=@can, &(0x7f0000000a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000fc0)={@dev, @multicast1}, &(0x7f0000001000)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'irlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004d80)=0x14) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xfee4) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e00)=0x14) 10:41:44 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018100000000000000007000000000000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000140)='sit0\x00') 10:41:44 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018100000000000000007000000000000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000000140)='sit0\x00') 10:41:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)) 10:41:44 executing program 3: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") pipe(&(0x7f0000000040)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0), 0x10) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) 10:41:44 executing program 2: getuid() unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/181) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000280), &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000680)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) 10:41:44 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), 0xc) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)) 10:41:44 executing program 0: semget(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 10:41:45 executing program 1: semget(0xffffffffffffffff, 0x1, 0x0) semop(0x0, &(0x7f0000000340), 0x0) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000009c0)=@can, &(0x7f0000000a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000fc0)={@dev, @multicast1}, &(0x7f0000001000)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'irlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004d80)=0x14) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xfee4) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e00)=0x14) 10:41:45 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x15, 0x0, 0x0, "22947f42a3c38ca118b35ad649702075"}, 0x15, 0x0) prctl$void(0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f0000000080)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000db2000/0x3000)=nil) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) 10:41:45 executing program 3: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") pipe(&(0x7f0000000040)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0), 0x10) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) 10:41:45 executing program 2: getuid() unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/181) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000280), &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000680)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) 10:41:45 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), 0xc) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)) 10:41:45 executing program 0: semget(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 10:41:46 executing program 1: semget(0xffffffffffffffff, 0x1, 0x0) semop(0x0, &(0x7f0000000340), 0x0) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000009c0)=@can, &(0x7f0000000a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000fc0)={@dev, @multicast1}, &(0x7f0000001000)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'irlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004d80)=0x14) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xfee4) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e00)=0x14) 10:41:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='vcan0\x00', 0x10e) r1 = memfd_create(&(0x7f0000000040)="237d00d3fc1efab01c240446771fbaa0a455c946301fb3b37eac0d503abe4d", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000140)=0x5, 0x80000001) 10:41:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='vcan0\x00', 0x10e) r1 = memfd_create(&(0x7f0000000040)="237d00d3fc1efab01c240446771fbaa0a455c946301fb3b37eac0d503abe4d", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000140)=0x5, 0x80000001) 10:41:46 executing program 2: set_robust_list(&(0x7f00000003c0)={&(0x7f0000000a40)={&(0x7f0000000a80)}, 0x0, &(0x7f0000000400)}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:41:46 executing program 3: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") pipe(&(0x7f0000000040)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0), 0x10) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) 10:41:46 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), 0xc) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)) 10:41:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='vcan0\x00', 0x10e) r1 = memfd_create(&(0x7f0000000040)="237d00d3fc1efab01c240446771fbaa0a455c946301fb3b37eac0d503abe4d", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000140)=0x5, 0x80000001) 10:41:46 executing program 0: semget(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 10:41:47 executing program 1: semget(0xffffffffffffffff, 0x1, 0x0) semop(0x0, &(0x7f0000000340), 0x0) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000009c0)=@can, &(0x7f0000000a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000fc0)={@dev, @multicast1}, &(0x7f0000001000)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'irlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004d80)=0x14) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xfee4) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e00)=0x14) 10:41:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='vcan0\x00', 0x10e) r1 = memfd_create(&(0x7f0000000040)="237d00d3fc1efab01c240446771fbaa0a455c946301fb3b37eac0d503abe4d", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000140)=0x5, 0x80000001) 10:41:47 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000140)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:41:47 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) 10:41:47 executing program 3: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") pipe(&(0x7f0000000040)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0), 0x10) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) 10:41:47 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) syz_execute_func(&(0x7f0000000680)="42805da0b60fef69dc0f01eec462b105878962b53073fe8c78110f110f420f76f3f242d2be00000000c481b5e5bc2b00000021def46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe26607d0bc50000000200703") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), 0xc) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)) 10:41:47 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) 10:41:47 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080)) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:41:48 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) 10:41:48 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@random="832653a2dab6", @local={[], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast}, @icmp=@timestamp}}}}, &(0x7f0000000040)) 10:41:48 executing program 1: futex(&(0x7f00000001c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 10:41:48 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) 10:41:48 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000140)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:41:48 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:41:48 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x4, 0x0, 0xfffffffffffffffe, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 10:41:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) delete_module(&(0x7f0000000180)='vmnet1^ppp1\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:41:48 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x4, 0x0, 0xfffffffffffffffe, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 10:41:49 executing program 0: r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 10:41:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) delete_module(&(0x7f0000000180)='vmnet1^ppp1\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x4, 0x0, 0xfffffffffffffffe, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 10:41:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x4, 0x0, 0xfffffffffffffffe, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 10:41:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) fgetxattr(r0, 0xfffffffffffffffd, &(0x7f0000000080)=""/142, 0x8e) 10:41:49 executing program 0: r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 10:41:49 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000140)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:41:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) delete_module(&(0x7f0000000180)='vmnet1^ppp1\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000300)) 10:41:49 executing program 5: syz_emit_ethernet(0x11, &(0x7f0000000080)={@random="1eaa1bc9a981", @broadcast, [], {@mpls_uc={0x8847, {[], @llc={@llc={0x0, 0x0, 'Z'}}}}}}, &(0x7f0000000600)) keyctl$set_reqkey_keyring(0x17, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000002c0)="42568055a07b7ac5818a818a8adc00d990c841ff0fc4e271084f00d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1c4a11dd1b44cad000000c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 10:41:49 executing program 1: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000140)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) getgroups(0x0, &(0x7f0000000380)) listen(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000440)) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:41:49 executing program 0: r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 10:41:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @local, 0x0, 0x1, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x84, @broadcast, 0x0, 0x1, 'ovf\x00'}, 0x2c) 10:41:50 executing program 0: r0 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 10:41:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) delete_module(&(0x7f0000000180)='vmnet1^ppp1\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:41:50 executing program 0: setrlimit(0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000880)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000008c0)}) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getpid() keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:41:50 executing program 3: clock_gettime(0x7, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() [ 165.587878] audit: type=1326 audit(1536921710.583:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7719 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:41:50 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000140)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:41:50 executing program 4: unshare(0x600) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 10:41:50 executing program 0: futex(&(0x7f00000000c0), 0x6, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:41:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000040)) 10:41:50 executing program 1: syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) dup(0xffffffffffffffff) getuid() setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000300)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 10:41:51 executing program 4: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:51 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000040)) 10:41:51 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000040)) 10:41:51 executing program 4: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:51 executing program 3: clock_gettime(0x7, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() 10:41:51 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000040)) 10:41:51 executing program 4: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 166.619968] audit: type=1326 audit(1536921711.622:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7761 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:41:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x46400) io_setup(0x8000000007, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc, 0xf00000000000000}]) 10:41:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0x0) 10:41:51 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) 10:41:51 executing program 1: syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) dup(0xffffffffffffffff) getuid() setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000300)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 10:41:51 executing program 4: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x46400) io_setup(0x8000000007, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc, 0xf00000000000000}]) 10:41:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0x0) 10:41:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0x0) 10:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x46400) io_setup(0x8000000007, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc, 0xf00000000000000}]) 10:41:52 executing program 3: clock_gettime(0x7, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() 10:41:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000596000)=0x9, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @broadcast}, 0x10) 10:41:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0x0) 10:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x46400) io_setup(0x8000000007, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc, 0xf00000000000000}]) 10:41:52 executing program 4: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000380)=0xc) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000540)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000680)="0176626f786e6574307b5b2800", 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgid(0x0) sched_setattr(0x0, &(0x7f0000000200), 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xffffffffffffffc8) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) semget$private(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000540)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 167.705311] audit: type=1326 audit(1536921712.715:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7812 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:41:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x24020400) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x8907, &(0x7f00000000c0)) 10:41:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x5, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:41:52 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 10:41:52 executing program 1: syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) dup(0xffffffffffffffff) getuid() setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000300)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 10:41:53 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 10:41:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 10:41:53 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 10:41:53 executing program 3: clock_gettime(0x7, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() 10:41:53 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@remote, 0x0, r1}) 10:41:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x5, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:41:53 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 168.725528] audit: type=1326 audit(1536921713.735:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7854 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:41:53 executing program 4: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000380)=0xc) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000540)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000680)="0176626f786e6574307b5b2800", 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgid(0x0) sched_setattr(0x0, &(0x7f0000000200), 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xffffffffffffffc8) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) semget$private(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000540)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 10:41:53 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x9, 0xba95}, &(0x7f0000000040)) 10:41:53 executing program 1: syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) dup(0xffffffffffffffff) getuid() setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000300)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 10:41:53 executing program 0: inotify_init1(0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000340)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:41:54 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x9, 0xba95}, &(0x7f0000000040)) 10:41:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x5, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:41:54 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x9, 0xba95}, &(0x7f0000000040)) 10:41:54 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x9, 0xba95}, &(0x7f0000000040)) 10:41:54 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000001180), 0x0, 0x0, &(0x7f0000001240)={0x0, 0x989680}) accept4$unix(0xffffffffffffffff, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000005c0)=0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) getuid() quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000240)) 10:41:54 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@remote, @in6=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) getuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000dc0)='cgroup.controllers\x00', 0x0, 0x0) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000d00)=ANY=[], 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641f3400fc737c4c2958e0941a30f7f7f3766460f38e3450f7777c1459090d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1210f0da11b000000010d64ac1e5dc4213c59fb05987bc8e6") 10:41:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x5, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:41:54 executing program 4: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000380)=0xc) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000540)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000680)="0176626f786e6574307b5b2800", 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgid(0x0) sched_setattr(0x0, &(0x7f0000000200), 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xffffffffffffffc8) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) semget$private(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000540)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:54 executing program 1: futex(&(0x7f0000000300), 0x6, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f00000001c0), 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0xfffffffffffffc1b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000180)=0x40) 10:41:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x600}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:41:55 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @empty, @multicast1, @random="93e3ce93d3a1", @dev}}}}, &(0x7f00000000c0)) 10:41:55 executing program 0: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:41:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180)=0x7f, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 10:41:55 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000001180), 0x0, 0x0, &(0x7f0000001240)={0x0, 0x989680}) accept4$unix(0xffffffffffffffff, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000005c0)=0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) getuid() quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000240)) 10:41:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180)=0x7f, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 10:41:55 executing program 4: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000380)=0xc) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000540)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000680)="0176626f786e6574307b5b2800", 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgid(0x0) sched_setattr(0x0, &(0x7f0000000200), 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xffffffffffffffc8) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) semget$private(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000540)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:55 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000440)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 10:41:56 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000580), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) gettid() ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da06a0f460f46dc0f263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adfe90df8898a1387e") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f00000005c0)}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180)=0x7f, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 10:41:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:41:56 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000001180), 0x0, 0x0, &(0x7f0000001240)={0x0, 0x989680}) accept4$unix(0xffffffffffffffff, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000005c0)=0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) getuid() quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000240)) 10:41:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180)=0x7f, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 10:41:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r0, 0x800454cf, 0x70e000) [ 171.612093] IPVS: ftp: loaded support on port[0] = 21 [ 171.622993] device lo entered promiscuous mode [ 171.681860] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 171.695191] IPVS: length: 33 != 24 [ 171.697638] IPVS: sync thread started: state = MASTER, mcast_ifn = lo, syncid = 0, id = 0 [ 172.198637] IPVS: ftp: loaded support on port[0] = 21 [ 172.258643] IPVS: length: 33 != 24 10:41:57 executing program 4: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 10:41:57 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000580), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) gettid() ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da06a0f460f46dc0f263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adfe90df8898a1387e") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f00000005c0)}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:57 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/104, 0x68) 10:41:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) 10:41:57 executing program 0: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:41:57 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000001180), 0x0, 0x0, &(0x7f0000001240)={0x0, 0x989680}) accept4$unix(0xffffffffffffffff, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000005c0)=0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) getuid() quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000240)) 10:41:57 executing program 1: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:41:57 executing program 5: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:41:57 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000580), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) gettid() ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da06a0f460f46dc0f263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adfe90df8898a1387e") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f00000005c0)}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:58 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000580), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) gettid() ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da06a0f460f46dc0f263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adfe90df8898a1387e") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f00000005c0)}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:41:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001500192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 10:41:58 executing program 2: syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 10:41:58 executing program 4: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 10:41:58 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="57762a98e9ed6d0d3cb6c79c6ec199ad", 0x10) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000700)="42805da0be0fef69dc0f01eece73fe380f382167470fe3e1f0817e768cc80000000081b5e5bc2b0000002167dae5e54175458f261ac4010d64ac1e5d31a3b744dbe271fb0703") [ 174.023657] IPVS: ftp: loaded support on port[0] = 21 [ 174.083322] IPVS: length: 33 != 24 [ 174.202963] IPVS: ftp: loaded support on port[0] = 21 [ 174.262091] IPVS: ftp: loaded support on port[0] = 21 [ 174.294938] device lo entered promiscuous mode [ 174.321204] device lo entered promiscuous mode [ 174.332164] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 174.341188] IPVS: sync thread started: state = MASTER, mcast_ifn = lo, syncid = 0, id = 0 [ 174.341431] IPVS: length: 33 != 24 10:41:59 executing program 4: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") [ 174.405824] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 174.421476] IPVS: sync thread started: state = MASTER, mcast_ifn = lo, syncid = 0, id = 0 [ 174.430674] IPVS: length: 33 != 24 10:41:59 executing program 2: syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 10:42:02 executing program 0: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10) 10:42:02 executing program 1: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:02 executing program 4: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 10:42:02 executing program 2: syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 10:42:02 executing program 5: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:02 executing program 3: mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000400)) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000002c0), 0x4) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f0000000580), &(0x7f0000000740), &(0x7f0000000780)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@remote, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./bus\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgid() lstat(&(0x7f0000000c40)='./bus\x00', &(0x7f0000000c80)) stat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000dc0)={0x10}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000440)="bd9924e367c60d59213a370406c9c2a92d3cedc33bc257d25ee468f524e6c016a175791685b003e3d1a82466ea4383517a34c82fae64b7ce298dbfee72069f7717dacc1437599b3dbba6d6647ed94133157a0aa22a40e3fe1e6001e5d58ac458269b63ba9e15849712856fd25fe3983d9f739c046ef33d095733301dd59655155633a97ee64b435f649c8cdb8051665a2ed9b1900367cb92890b14f27e38f93ea679ec833430821ebad1835cd01a543ee7905f92f029abb78156fb2716ca638956865b9132e41f91a7a4e22b2ea624fd09c5bacf009d8591c8018199eef321994fcb02fdd5d8bff53fb041ae7add31b56c360a31ebe7c9f02b187e7b9b3f1727") getpgid(0x0) getpgrp(0xffffffffffffffff) [ 178.114085] IPVS: ftp: loaded support on port[0] = 21 10:42:03 executing program 4: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_open_procfs(0x0, &(0x7f0000000040)='children\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000000c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14}, 0x14}}, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000007c0)=""/95) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 10:42:03 executing program 2: syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") [ 178.197861] IPVS: length: 33 != 24 [ 178.575481] IPVS: ftp: loaded support on port[0] = 21 10:42:03 executing program 3: mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000400)) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000002c0), 0x4) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f0000000580), &(0x7f0000000740), &(0x7f0000000780)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@remote, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./bus\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgid() lstat(&(0x7f0000000c40)='./bus\x00', &(0x7f0000000c80)) stat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000dc0)={0x10}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000440)="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") getpgid(0x0) getpgrp(0xffffffffffffffff) [ 178.663229] IPVS: length: 33 != 24 [ 178.773037] IPVS: ftp: loaded support on port[0] = 21 [ 178.850662] IPVS: length: 33 != 24 10:42:03 executing program 0: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:04 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:04 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0x0, @fd}]}]}, 0x24c}}, 0x0) 10:42:04 executing program 5: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:04 executing program 1: personality(0x1bb2baf3005ac137) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'lo\x00'}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/33, &(0x7f00000001c0)=0x21) mprotect(&(0x7f0000305000/0x3000)=nil, 0x3000, 0x5) 10:42:04 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) inotify_init() dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000440)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) add_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000380), &(0x7f00000003c0)='IPVS\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), &(0x7f0000000900)='eth0-\x00', 0x0) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_execute_func(&(0x7f0000000740)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:04 executing program 3: mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000400)) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000002c0), 0x4) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f0000000580), &(0x7f0000000740), &(0x7f0000000780)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@remote, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./bus\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgid() lstat(&(0x7f0000000c40)='./bus\x00', &(0x7f0000000c80)) stat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000dc0)={0x10}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000440)="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") getpgid(0x0) getpgrp(0xffffffffffffffff) 10:42:04 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:05 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:05 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:05 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:05 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 180.612076] IPVS: ftp: loaded support on port[0] = 21 [ 180.667895] IPVS: length: 33 != 24 [ 180.950986] IPVS: ftp: loaded support on port[0] = 21 [ 181.018751] IPVS: length: 33 != 24 [ 181.095059] IPVS: ftp: loaded support on port[0] = 21 [ 181.124058] IPVS: length: 33 != 24 10:42:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb}]}}}]}, 0x3c}}, 0x0) 10:42:06 executing program 3: mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000400)) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000002c0), 0x4) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f0000000580), &(0x7f0000000740), &(0x7f0000000780)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@remote, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./bus\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgid() lstat(&(0x7f0000000c40)='./bus\x00', &(0x7f0000000c80)) stat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000dc0)={0x10}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000440)="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") getpgid(0x0) getpgrp(0xffffffffffffffff) 10:42:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@broute={"62726f75746500000000000000000000000000000000000000c000", 0x20, 0x1, 0x168, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000040), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_0\x00', 'vlan0\x00', 'eql\x00', 'ifb0\x00', @empty, [], @remote, [], 0xa0, 0xa0, 0xd8, [@cpu={'cpu\x00', 0x8}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}]}]}, 0x1e0) [ 181.356204] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 10:42:06 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:06 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000340)) syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000200)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$pppoe(0x18, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:06 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x240000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000480)=0x10) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000280)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getrusage(0x0, &(0x7f00000003c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, &(0x7f0000004340)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="bf16000000000000b707000001000000487000000000e0ff40004000000000009500000200000000"], &(0x7f00000003c0)='GPL\x00'}, 0x48) 10:42:06 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005000, &(0x7f0000000040)) 10:42:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="db327e09e11531e06275296df7f124349edb96ecdb81c6ce9dc6825a4302dfabae", 0x21) 10:42:07 executing program 5: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641ffaa32333333c4c2958e0941a30f7f7f3766460f38f30f7ec544c19086d962788f35c935c97d197a0779fbc463fd7998b400ba980079aaffd0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$notify(r0, 0x402, 0x0) 10:42:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000340)='io.weight\x00', 0x2, 0x0) r2 = dup2(r1, r0) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20}, 0x20) 10:42:07 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), 0x4) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) geteuid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006880)={@mcast2}, &(0x7f00000068c0)=0x14) sendto(0xffffffffffffffff, &(0x7f0000006900), 0x0, 0x0, &(0x7f00000002c0)=@xdp, 0x80) getsockname$netlink(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f0000000440)=0x4) eventfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x6, 0x6, 0xfffffffffffffffd}, 0x14}}, 0x0) 10:42:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b40000002a000000b401000000000000b4020000010000009c120000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:42:07 executing program 4: memfd_create(&(0x7f0000000280)='/dev/full\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000001c0), 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:07 executing program 1: syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file1\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 10:42:07 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x240000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000480)=0x10) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000280)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getrusage(0x0, &(0x7f00000003c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, &(0x7f0000004340)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b40000002a000000b401000000000000b4020000010000009c120000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:42:08 executing program 5: clock_gettime(0x2, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b40000002a000000b401000000000000b4020000010000009c120000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:42:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b40000002a000000b401000000000000b4020000010000009c120000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:42:08 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), 0x4) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) geteuid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006880)={@mcast2}, &(0x7f00000068c0)=0x14) sendto(0xffffffffffffffff, &(0x7f0000006900), 0x0, 0x0, &(0x7f00000002c0)=@xdp, 0x80) getsockname$netlink(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f0000000440)=0x4) eventfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0xfffffffffffffffd) 10:42:08 executing program 0: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:08 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x240000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000480)=0x10) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000280)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getrusage(0x0, &(0x7f00000003c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, &(0x7f0000004340)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:08 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bpq0\x00', {0x2, 0x0, @dev}}) sysinfo(&(0x7f0000000540)=""/245) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:42:09 executing program 5: clock_gettime(0x2, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:09 executing program 1: syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file1\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 10:42:09 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), 0x4) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) geteuid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006880)={@mcast2}, &(0x7f00000068c0)=0x14) sendto(0xffffffffffffffff, &(0x7f0000006900), 0x0, 0x0, &(0x7f00000002c0)=@xdp, 0x80) getsockname$netlink(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f0000000440)=0x4) eventfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:09 executing program 0: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)) getrandom(&(0x7f0000000140)=""/64, 0x40, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @rand_addr}, &(0x7f00000003c0)=0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'erspan0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') recvfrom$inet(0xffffffffffffffff, &(0x7f0000000540)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:42:09 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x240000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000480)=0x10) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000280)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getrusage(0x0, &(0x7f00000003c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, &(0x7f0000004340)) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:10 executing program 5: clock_gettime(0x2, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:10 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bpq0\x00', {0x2, 0x0, @dev}}) sysinfo(&(0x7f0000000540)=""/245) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:42:10 executing program 0: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)) getrandom(&(0x7f0000000140)=""/64, 0x40, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @rand_addr}, &(0x7f00000003c0)=0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'erspan0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') recvfrom$inet(0xffffffffffffffff, &(0x7f0000000540)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:42:10 executing program 1: syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file1\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 10:42:10 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), 0x4) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) geteuid() accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006880)={@mcast2}, &(0x7f00000068c0)=0x14) sendto(0xffffffffffffffff, &(0x7f0000006900), 0x0, 0x0, &(0x7f00000002c0)=@xdp, 0x80) getsockname$netlink(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f0000000440)=0x4) eventfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080)=0x7fff, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:42:10 executing program 0: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)) getrandom(&(0x7f0000000140)=""/64, 0x40, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @rand_addr}, &(0x7f00000003c0)=0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'erspan0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') recvfrom$inet(0xffffffffffffffff, &(0x7f0000000540)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:42:11 executing program 5: clock_gettime(0x2, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080)=0x7fff, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:42:11 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bpq0\x00', {0x2, 0x0, @dev}}) sysinfo(&(0x7f0000000540)=""/245) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:42:11 executing program 3: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080)=0x7fff, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:42:11 executing program 0: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000040)) getrandom(&(0x7f0000000140)=""/64, 0x40, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @rand_addr}, &(0x7f00000003c0)=0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'erspan0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') recvfrom$inet(0xffffffffffffffff, &(0x7f0000000540)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:42:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080)=0x7fff, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:42:11 executing program 1: syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file1\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 10:42:11 executing program 3: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 2: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x20000000) clone(0x2c000400, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 10:42:12 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bpq0\x00', {0x2, 0x0, @dev}}) sysinfo(&(0x7f0000000540)=""/245) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:42:12 executing program 3: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 2: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 2: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x20000000) clone(0x2c000400, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 10:42:12 executing program 3: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)=0x1) 10:42:12 executing program 1: ioperm(0x0, 0x670, 0x0) 10:42:12 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:12 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:13 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x20000000) clone(0x2c000400, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 10:42:13 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000980)) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='hfsplus\x00', 0xb0, &(0x7f00000002c0)='proc//,/trustedð0\x00') 10:42:13 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) fstat(0xffffffffffffffff, &(0x7f00000020c0)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in=@local, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002240)=0xe8) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000000700)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000002340)}, 0x0) clock_getres(0x0, &(0x7f0000000140)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getgid() 10:42:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") 10:42:13 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:13 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:13 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x20000000) clone(0x2c000400, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 10:42:13 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:14 executing program 2: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:14 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 10:42:14 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000480)) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 10:42:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000540)=@add_del={0x2, &(0x7f0000000500)}) 10:42:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') 10:42:14 executing program 1: futex(&(0x7f0000000380), 0xa, 0x0, &(0x7f0000000280)={0x77359400}, &(0x7f0000000200), 0x200000000004) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 10:42:14 executing program 3: r0 = socket$packet(0x11, 0x2000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x2040000000f, &(0x7f0000000000)=0x100, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2dbd94c3b50035060f118d0000f55dc62600009b000000faffffff00000000aeb46245004bae1356642490a7b5fc88046afd77fc7ae664f65bfc370ad30c2750684a7a4938b4b677081c14445c06232055397880d89abad699af485f036c70bbb8", 0x9c, 0x0, &(0x7f0000000080)={0xa, 0x200800800, 0x4, @remote}, 0x1c) 10:42:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) socket$inet6(0xa, 0x1, 0x0) gettid() clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xee3692730b499e4e, 0x356, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xd61a, 0x8, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x4e21, @multicast2}}}, 0x84) 10:42:14 executing program 4: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getpid() getpgrp(0x0) 10:42:14 executing program 2: pipe(&(0x7f0000000480)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0xc) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000bc0)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000014c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004e00)=0xe8) getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004f40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000005040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080), &(0x7f00000050c0)=0xc) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005440)) fstat(0xffffffffffffffff, &(0x7f0000005480)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005500), &(0x7f0000005540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005580)) lstat(&(0x7f0000005600)='./file0/file0\x00', &(0x7f0000005640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007b40)) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008200), &(0x7f0000008240)=0xc) getresuid(&(0x7f0000008280), &(0x7f00000082c0), &(0x7f0000008300)) stat(&(0x7f0000008340)='./file0\x00', &(0x7f0000008380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008400), &(0x7f0000008440)=0xc) lstat(&(0x7f0000008480)='./file0\x00', &(0x7f00000084c0)) getgroups(0x0, &(0x7f0000008540)) getpgid(0x0) stat(&(0x7f0000008740)='./file0\x00', &(0x7f0000008780)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da09b0fef69dc0f01eecf73fe19fa6f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='vcan0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240)="15", 0x1, 0x0, 0x0, 0x0) 10:42:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/160, 0xa0}, {&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001380)=""/102, 0x66}}], 0x1, 0x0, &(0x7f00000056c0)={0x0, 0x989680}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 10:42:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) [ 189.917490] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 189.949790] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 189.998919] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 190.028366] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 190.039150] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 190.069183] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 190.098484] netlink: 'syz-executor3': attribute type 29 has an invalid length. 10:42:15 executing program 0: sysinfo(&(0x7f0000000840)=""/245) select(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ptrace(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/140, 0x8c) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) getpgrp(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/pid\x00') ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) syncfs(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") getpid() 10:42:15 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) 10:42:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/160, 0xa0}, {&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001380)=""/102, 0x66}}], 0x1, 0x0, &(0x7f00000056c0)={0x0, 0x989680}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 190.243256] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 10:42:15 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) [ 190.398484] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 190.424812] netlink: 'syz-executor3': attribute type 29 has an invalid length. 10:42:15 executing program 1: setrlimit(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x4, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000005300)="277bfe5f88ad2fc2c51fe78ebcf9198286d4c6a74f588956b92b55e93b20a13679cefc5dcfa1362415a2975374f3b853a525f1d36b6284ea751501ad084a7027473d5a7ad4bcf161f9ec8529fed8c9e2cc2468aa54353a6aa6d2e70b221691e1646325a9490b2864f516f60f5b93699850a4c6266a418e6ee1c9fec7f80df98a129d706fa09e0975f76afb9ab69350818a83f5ac7a246b29a5eb0bf8814e496a58b7d726e8abccba75b53d25501ef660a730c3b212f4f7a30f9579fe740c9becb77e97c9de98d6b2d7dd55a5eaaebafd407249e913dc2fbbcfafbc37dc4175aec406c426ca169e939913ea999b8733902ed68def4c6c76e4acd58c9a5dcfca5c") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000024c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001fc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002140)) getpgrp(0xffffffffffffffff) getuid() bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=@raw, &(0x7f0000000340)='GPL\x00', 0x0, 0x88, &(0x7f0000000380)=""/136}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fstat(0xffffffffffffffff, &(0x7f0000000200)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 190.463762] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 190.476617] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 10:42:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/160, 0xa0}, {&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001380)=""/102, 0x66}}], 0x1, 0x0, &(0x7f00000056c0)={0x0, 0x989680}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 10:42:15 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) 10:42:15 executing program 2: clock_gettime(0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000300)}, 0x10) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) flock(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:15 executing program 4: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getpid() getpgrp(0x0) 10:42:15 executing program 1: setrlimit(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x4, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000005300)="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") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000024c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001fc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002140)) getpgrp(0xffffffffffffffff) getuid() bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=@raw, &(0x7f0000000340)='GPL\x00', 0x0, 0x88, &(0x7f0000000380)=""/136}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fstat(0xffffffffffffffff, &(0x7f0000000200)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 190.750273] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 190.785050] netlink: 'syz-executor3': attribute type 29 has an invalid length. 10:42:15 executing program 5: mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004080)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 10:42:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/160, 0xa0}, {&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001380)=""/102, 0x66}}], 0x1, 0x0, &(0x7f00000056c0)={0x0, 0x989680}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 10:42:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0xfffffffffffffc37, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, r1}}, 0xfffffdff) 10:42:16 executing program 1: setrlimit(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x4, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000005300)="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") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000024c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001fc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002140)) getpgrp(0xffffffffffffffff) getuid() bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=@raw, &(0x7f0000000340)='GPL\x00', 0x0, 0x88, &(0x7f0000000380)=""/136}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fstat(0xffffffffffffffff, &(0x7f0000000200)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:42:16 executing program 3: utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) sync() syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:42:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0xfffffffffffffc37, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, r1}}, 0xfffffdff) 10:42:16 executing program 1: setrlimit(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x4, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000005300)="277bfe5f88ad2fc2c51fe78ebcf9198286d4c6a74f588956b92b55e93b20a13679cefc5dcfa1362415a2975374f3b853a525f1d36b6284ea751501ad084a7027473d5a7ad4bcf161f9ec8529fed8c9e2cc2468aa54353a6aa6d2e70b221691e1646325a9490b2864f516f60f5b93699850a4c6266a418e6ee1c9fec7f80df98a129d706fa09e0975f76afb9ab69350818a83f5ac7a246b29a5eb0bf8814e496a58b7d726e8abccba75b53d25501ef660a730c3b212f4f7a30f9579fe740c9becb77e97c9de98d6b2d7dd55a5eaaebafd407249e913dc2fbbcfafbc37dc4175aec406c426ca169e939913ea999b8733902ed68def4c6c76e4acd58c9a5dcfca5c") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000024c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001fc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@loopback, @in=@broadcast}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002140)) getpgrp(0xffffffffffffffff) getuid() bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=@raw, &(0x7f0000000340)='GPL\x00', 0x0, 0x88, &(0x7f0000000380)=""/136}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fstat(0xffffffffffffffff, &(0x7f0000000200)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:42:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0xfffffffffffffc37, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, r1}}, 0xfffffdff) 10:42:16 executing program 4: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getpid() getpgrp(0x0) 10:42:16 executing program 2: socket$vsock_dgram(0x28, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 10:42:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000016ff0)={&(0x7f0000000280)={0x18, 0x55, 0x3ef, 0x0, 0x0, {0x7}, [@generic="9f"]}, 0x18}}, 0x0) 10:42:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x800, 0x2, 0x0, 0x0, 0x7f, 0x6}, 0x20) 10:42:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0xfffffffffffffc37, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, r1}}, 0xfffffdff) 10:42:17 executing program 2: socket$vsock_dgram(0x28, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) [ 192.069148] PF_BRIDGE: br_mdb_parse() with unknown ifindex 10:42:17 executing program 5: unshare(0x20400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)) 10:42:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @rand_addr}}, 0x1e) bind$pptp(r1, &(0x7f0000000240), 0x1e) 10:42:17 executing program 3: utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) sync() syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:42:17 executing program 2: socket$vsock_dgram(0x28, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 10:42:17 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) syz_execute_func(&(0x7f00000005c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38218f0a4812057b070000feeffffff0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac401a864ac1e4d31a3b74472e671fb0703") 10:42:17 executing program 5: prctl$void(0x1f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:42:17 executing program 2: socket$vsock_dgram(0x28, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 10:42:17 executing program 4: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getpid() getpgrp(0x0) 10:42:17 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) getpgid(0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:42:17 executing program 2: clock_gettime(0x2, &(0x7f0000000200)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) socket$packet(0x11, 0x0, 0x300) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f00000003c0)) pipe(&(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000080)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000340)) syz_execute_func(&(0x7f00000001c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) pipe(&(0x7f0000000540)) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000480)) timer_gettime(0x0, &(0x7f00000004c0)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:42:18 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184153, &(0x7f0000000040)) 10:42:18 executing program 1: timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:42:18 executing program 3: utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) sync() syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:42:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@remote}, 0x349) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000440)={@remote}, 0x459) close(r1) 10:42:18 executing program 5: prctl$intptr(0x1, 0x0) prctl$void(0x0) dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000280), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:42:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0000bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001504000000ffffffbd460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 10:42:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xd9, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:42:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0000bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001504000000ffffffbd460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 10:42:18 executing program 4: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "c1410892e2dac1b26ef05869921e8ee39974371fec1c59ab28a2e12497b7242cd57eb2569bf5b88cb0f2b7fd379f2b501f6746d6b0b86596e4f33258ba30c0c25c5dfa538a663654871ae868630b8c2c4aaabc7e289c4a11dbd95389023284162752550b1bf26fb375c6d4da7528bce724d82aa14b49f44f90ac67fd8ea6e7f9950f097cd2bf3ee29a0b24986b80e9a53bba9d9f25dbae382527ef9f2b723fadfc9fd5a76773427b1960738014cda33a94c70386a6ea5e612a5ac243d76981a6bbb3b4711c4cb3bfeff89cdff04f0f3c280a34aed2ea2541ce67af1d314e3220f26410cdd03ed94726b8b850d28a9829817f4ac13ada90878cb050b1944ded0d530c3932babd5d0afba462767230a64cd0a851f9ac57f2d6dfc7bcde0558908b08d4f1ed15a54ac8b7c2e81bf320f3e98a9bc1959836323f5bc338df79767c43c1632fb82a6e0b415032bbabca47d48894b8d28c62f089e15444ebaf850863e24ee2ecd03bafe629f5ea8dd2e42617f8171d0ab9a85757718368fcc81d6a16f0a4fca258d6ec067476092b967b1fe6c03b3c539e32e7f916465cda54e264bf1e86b13caf7ee3ca7dff11693a1693fe275b624e8375fd20cef04a2297d0188ea15601dfe0aea23b16288188a1546cfbad3f4317d9fdf4f929d530d9bcbcbcfe42b6a25d317e0b901f8ef588a662a0cb0e3de3817bc22aa392123b42a3d13006fe2f346028ec692a8cfb39778b25dc066cca8b6cd77f2f713738b7eab53bd84b89fe9a145f507841fe8d742bbdfc36cf0d9a41f11098193756fe6f299979550f68ad6b1514b917e1aa0ee2d51e7f6d1f48665785617cc2e10e337684cf3c65f295ca9c4ab46623a3f8d1adad7ece14ecfd578602d9ed945a0fccd70f248a0853ec76c973a6af60e408643a66346848ba3657ebd353103c83ea68a961e6c63ce1431d3690de05693c80312ec53d5f6e9109c9422f644bc9f5a656529b6c6c9baa2579b06d6976e4b19594c52598c08c00b27a80a22b2aa3f2cbc28f7f16473b6590bc48bfea993bd69335fac8453ca56239fd5441830c2d44b6477e95b318a24dc8ad138ae9ef05a5bcf386bc5771756a9ac632ba06124acb55e7be7d4ef4a783c2207efd882433ef612fd596db054b1573943349e74975b910653c925c0c2e57c171aa0ec24f72615d0fb7bffb24127e90e8f72c4fef499e6e5a5e93696c6c7a72559f8a401edacdddb295ecf6ffe3b2c33e1c95f70b59fa83bf8d8cb3d65e9ff4d24873177e375c12d1b4f303457df2dd88385f0bdce1a03fcb9c1adfabe58c7c9a87a3fec21b7dd41c23552c2d9bc475fcf0c2f2cf8e4a90c41cde4a46c351e0ecb5136a1432f3ea91e42580928393c142846916c1ce5634fe918d4202d77da4af1cd87918301868d5ed26fa352efba1cd10e6f2d192521df00f4eaaaafbc3e8eb3a03c066d7aa43c7b0b8ac4716c9a82afc96ffe70fd39607151e8c6fff16c09ba61368a94e61f3d66f60d1baf054c2053758fa7d1d5dc59109915298038dcb16f265c8f3da954705eee3f5fcd83c95a4f326d0ecf2047399515b902b2a11adc5482019b919d69aa8d1e9b94672d945fec1770a70901206949c4b28ce4a6db15e537be56f4d5787f8ea4b88eaa66b3a36c4590c31b68e5b81fa4e6c5854e6a0499e4d1822be8cae21a0bb994dca2ef2d420e820c1a429b04aa0f2929220318e1147a5281673861c3d729aad5e32c1a866ee8e00ff6f42bfc2a009af88e6700a8ab52a1976a5d6ba6e64c6f68bbd0ed5908270e9b59c1a801237d3ed36167219d75eeeeb5c0e12834cb54dae193b058d2b1a9f4f895c7d0096631c2447f23c435898650de498a5685b2cadde196fb290413ed23e0b9b1923835585a70c2081110ac521f13654b192bf594ecef8fa3d8b20587572f63790dcc59ba1fb984aa0eaa82fdc15d592aff7fa55a8cc0696c4d7e07f4f3363846ebe592520de60c934fac4fc499b3e60f142db2b775173e4be01e5a83bc55b285dbdc48b4657b64267dde54486a87e93139d1241f5727fd6e5ce9875ee3c62c12ce60cb50a2706c83d83925e6007fa8e81db463797f27544e46faaa73eb18111f745a9ca26710cfe2794f1da060d375c811473b5a34e2d7bc4f943eac107fa17e4a257894471db1739a85c33813304337037a367630188fb8c6e0a9951be7aa79fd79f2b0093726a1cf1423f85b4827c470fe4bce3afa8dbb37ec8c2ae26dc3acca3f9e96fafb6961361ad1ab7ea6e2404ef11aa50bbd608c24e21f1b8f3848871a1a20e04f8c9bce328c62319dc49a07b588c7e47e91261f2cbe63f2fc425a928b70d18e218cb1c56607df4e7f981c578452db9f7daceb48c3a311cf6c7b99b25824b6d7e0f5501afd5f44a702e9ff07063aba780432ff3d70cd00b15739a8307adef6dd1219d9084aa16b88fa756395cd4b8f66e5199e00d3c440a69d1970c9416789260663de3f642c3268daeffd999ef30f452101777395e594ae637c3c6b7030ec121fca2141c0d989002e4c686c506431223913c0a0a0dc8445342d72de4bbd796f9f622b98a9eb5afc2673101c3dd493ad85fc6341383e0d1408423c43c09afed6b6c9519e53e34f2db25ccb2f53b08c0e0fb6cc46ca4e41e036d8789a41726e59786d2482299ac10dd1402960bbd57efbd1e34cf490e436573a339c7a111bca9a28edb4ea54b634c4c135cca1184e4baf6fc877ead989e4f32f3949be9fb9ab36104fb4fc697ff530e2d1b6a2de5dc993b760a928dcf2e6abc666530cc36fe4ca3188dd0de7f3bac21eb054a7a01039839d7b76268652966ebf32cc4f7b5fad8d5ce1acedad1388ea6a731884e7041f0e3d44afce5dbeafeebe8d75c965d7a774b09537f551ea2dff264cbd763c9440434a1d387e3b48386cd65a5f26dd2bb4d3a29597a8d9c6c294c4ed059092bf26f886f3b06293545f460447928476ca76fabe55eeec8045de6de78e0a4d8afbe533c99e859122828f6fad63cb0554dc44c31bb13a66dc8d7655107a1f7c0487e8ae720825eb72c33fdce58bba16dabe95883308950c18c4ec91af62080d686cda0594a698fcd6d0d1272284e296e0b6e546aad929bdf5bb2563aa017998afaa5ea6e370cbd9ee888b84792b58d0ccff3e0920533edbb53f347470507e08959b44636b67a809bc4be6a7047942e018819e5b005f40ec2e659105f6db8a409256ff1b3a483a6080cee2f565f42560a9addbf0038d6fad1d9255b2d8bd947c04105fbba7bfc2a8b252ab7528de7d28452371526d1315832fa6c122e239e02c726c92a9ed40a67b6d2a7d5fbe35b656f82bd53d5c6523149ed5bd2a25f1d12187761f980c35c984c224f441ea13e98a7e771e04fdeae0467abb92bdac05c02b79860e7dd6ec61eb3350d2ba8293586b298df778009da0cfc6ddbf56500597f7eb7e5c2b84a649cd4a15d8e4d3dbb5c898674390cee634fcd0260e8373fdb436476cb4e50d771ff3fc479b6c4c129bcb0b0e03d7141802f574bf866cc4929c14b64bfb1fec7d47dfcffb967ea80cda9f2450256d411041fcbfe100b7ecd12a6b3e64210e13783a2a761358b04f408a1a0a4d8d0f5aff4493e085ffd5c71c9703be73319360acb63caff44e2c292bba67dbf8ea913484bdaaac6d24ca258d862d388ea71edde3499bd5b6058055be895b7c1ff9ef8b9a2e438ef614d7c2c6ba9d5b072a0271fc2370c34ec46bb79bcb36f92eeac02d342b1b7ef0141a9e978a162ebeca581236691b8ea31879080b3cad472e59a1137e853bb205f597978823fb1a50768e6bb10044142613c39de28a1eb252791a717392da132883b062ee2940b48d9b0d3f5487678f6f85abf74ef309129c2fd0a637ddec7172acbbd65b9ea052e3ac75ef39f375b8a49c7be88ea976c34bd42e1871896094ac8d35d0a00a42fbfe55ba13ea0d28dd9118334cdf680b2213aacbd74d363fd5ab7702b1c8d929b468f4707026d9231c7c0a79012fed6402fc7c61e6af886b7bd478be8ca7345ff3105c45f8dc9e69f683143933786daeaec6d9a76e2edf67f166cbfc5befff2ba27b3b3427c60abf0261fb7acbf837643b27073d9fd199310329019d295c17df5758da928fffecdd7e1a654cf91bbfdf399011377b37b988b25fd60ab2e827af19e9d846e1b9e9f2662f55a3cd4ddf1c26ef8dc2e39ec5af19c15049c56f040184c1fa75404af854ff076a6dc44c6897b7d29298e81faaf213122d31b1c77a7c8f111a06bd0813114d542d2f4f3eb6b82e4a6bad139ff9ca4377f", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x0) 10:42:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0000bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001504000000ffffffbd460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 10:42:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "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", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0000bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001504000000ffffffbd460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 10:42:19 executing program 1: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "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", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 3: utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) sync() syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:42:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xa00, 0x0) read$FUSE(r0, &(0x7f0000000a00), 0x1000) close(r0) 10:42:19 executing program 5: setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "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", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 1: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "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", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xa00, 0x0) read$FUSE(r0, &(0x7f0000000a00), 0x1000) close(r0) 10:42:19 executing program 0: clock_nanosleep(0x40003, 0x0, &(0x7f0000000140), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000011c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001180)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001700)=0xe8) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) socket$inet(0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001880)) geteuid() getegid() getuid() getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'rose0\x00'}) 10:42:19 executing program 1: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "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", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xa00, 0x0) read$FUSE(r0, &(0x7f0000000a00), 0x1000) close(r0) 10:42:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="c8a8707470", 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{}, "c1410892e2dac1b26ef05869921e8ee39974371fec1c59ab28a2e12497b7242cd57eb2569bf5b88cb0f2b7fd379f2b501f6746d6b0b86596e4f33258ba30c0c25c5dfa538a663654871ae868630b8c2c4aaabc7e289c4a11dbd95389023284162752550b1bf26fb375c6d4da7528bce724d82aa14b49f44f90ac67fd8ea6e7f9950f097cd2bf3ee29a0b24986b80e9a53bba9d9f25dbae382527ef9f2b723fadfc9fd5a76773427b1960738014cda33a94c70386a6ea5e612a5ac243d76981a6bbb3b4711c4cb3bfeff89cdff04f0f3c280a34aed2ea2541ce67af1d314e3220f26410cdd03ed94726b8b850d28a9829817f4ac13ada90878cb050b1944ded0d530c3932babd5d0afba462767230a64cd0a851f9ac57f2d6dfc7bcde0558908b08d4f1ed15a54ac8b7c2e81bf320f3e98a9bc1959836323f5bc338df79767c43c1632fb82a6e0b415032bbabca47d48894b8d28c62f089e15444ebaf850863e24ee2ecd03bafe629f5ea8dd2e42617f8171d0ab9a85757718368fcc81d6a16f0a4fca258d6ec067476092b967b1fe6c03b3c539e32e7f916465cda54e264bf1e86b13caf7ee3ca7dff11693a1693fe275b624e8375fd20cef04a2297d0188ea15601dfe0aea23b16288188a1546cfbad3f4317d9fdf4f929d530d9bcbcbcfe42b6a25d317e0b901f8ef588a662a0cb0e3de3817bc22aa392123b42a3d13006fe2f346028ec692a8cfb39778b25dc066cca8b6cd77f2f713738b7eab53bd84b89fe9a145f507841fe8d742bbdfc36cf0d9a41f11098193756fe6f299979550f68ad6b1514b917e1aa0ee2d51e7f6d1f48665785617cc2e10e337684cf3c65f295ca9c4ab46623a3f8d1adad7ece14ecfd578602d9ed945a0fccd70f248a0853ec76c973a6af60e408643a66346848ba3657ebd353103c83ea68a961e6c63ce1431d3690de05693c80312ec53d5f6e9109c9422f644bc9f5a656529b6c6c9baa2579b06d6976e4b19594c52598c08c00b27a80a22b2aa3f2cbc28f7f16473b6590bc48bfea993bd69335fac8453ca56239fd5441830c2d44b6477e95b318a24dc8ad138ae9ef05a5bcf386bc5771756a9ac632ba06124acb55e7be7d4ef4a783c2207efd882433ef612fd596db054b1573943349e74975b910653c925c0c2e57c171aa0ec24f72615d0fb7bffb24127e90e8f72c4fef499e6e5a5e93696c6c7a72559f8a401edacdddb295ecf6ffe3b2c33e1c95f70b59fa83bf8d8cb3d65e9ff4d24873177e375c12d1b4f303457df2dd88385f0bdce1a03fcb9c1adfabe58c7c9a87a3fec21b7dd41c23552c2d9bc475fcf0c2f2cf8e4a90c41cde4a46c351e0ecb5136a1432f3ea91e42580928393c142846916c1ce5634fe918d4202d77da4af1cd87918301868d5ed26fa352efba1cd10e6f2d192521df00f4eaaaafbc3e8eb3a03c066d7aa43c7b0b8ac4716c9a82afc96ffe70fd39607151e8c6fff16c09ba61368a94e61f3d66f60d1baf054c2053758fa7d1d5dc59109915298038dcb16f265c8f3da954705eee3f5fcd83c95a4f326d0ecf2047399515b902b2a11adc5482019b919d69aa8d1e9b94672d945fec1770a70901206949c4b28ce4a6db15e537be56f4d5787f8ea4b88eaa66b3a36c4590c31b68e5b81fa4e6c5854e6a0499e4d1822be8cae21a0bb994dca2ef2d420e820c1a429b04aa0f2929220318e1147a5281673861c3d729aad5e32c1a866ee8e00ff6f42bfc2a009af88e6700a8ab52a1976a5d6ba6e64c6f68bbd0ed5908270e9b59c1a801237d3ed36167219d75eeeeb5c0e12834cb54dae193b058d2b1a9f4f895c7d0096631c2447f23c435898650de498a5685b2cadde196fb290413ed23e0b9b1923835585a70c2081110ac521f13654b192bf594ecef8fa3d8b20587572f63790dcc59ba1fb984aa0eaa82fdc15d592aff7fa55a8cc0696c4d7e07f4f3363846ebe592520de60c934fac4fc499b3e60f142db2b775173e4be01e5a83bc55b285dbdc48b4657b64267dde54486a87e93139d1241f5727fd6e5ce9875ee3c62c12ce60cb50a2706c83d83925e6007fa8e81db463797f27544e46faaa73eb18111f745a9ca26710cfe2794f1da060d375c811473b5a34e2d7bc4f943eac107fa17e4a257894471db1739a85c33813304337037a367630188fb8c6e0a9951be7aa79fd79f2b0093726a1cf1423f85b4827c470fe4bce3afa8dbb37ec8c2ae26dc3acca3f9e96fafb6961361ad1ab7ea6e2404ef11aa50bbd608c24e21f1b8f3848871a1a20e04f8c9bce328c62319dc49a07b588c7e47e91261f2cbe63f2fc425a928b70d18e218cb1c56607df4e7f981c578452db9f7daceb48c3a311cf6c7b99b25824b6d7e0f5501afd5f44a702e9ff07063aba780432ff3d70cd00b15739a8307adef6dd1219d9084aa16b88fa756395cd4b8f66e5199e00d3c440a69d1970c9416789260663de3f642c3268daeffd999ef30f452101777395e594ae637c3c6b7030ec121fca2141c0d989002e4c686c506431223913c0a0a0dc8445342d72de4bbd796f9f622b98a9eb5afc2673101c3dd493ad85fc6341383e0d1408423c43c09afed6b6c9519e53e34f2db25ccb2f53b08c0e0fb6cc46ca4e41e036d8789a41726e59786d2482299ac10dd1402960bbd57efbd1e34cf490e436573a339c7a111bca9a28edb4ea54b634c4c135cca1184e4baf6fc877ead989e4f32f3949be9fb9ab36104fb4fc697ff530e2d1b6a2de5dc993b760a928dcf2e6abc666530cc36fe4ca3188dd0de7f3bac21eb054a7a01039839d7b76268652966ebf32cc4f7b5fad8d5ce1acedad1388ea6a731884e7041f0e3d44afce5dbeafeebe8d75c965d7a774b09537f551ea2dff264cbd763c9440434a1d387e3b48386cd65a5f26dd2bb4d3a29597a8d9c6c294c4ed059092bf26f886f3b06293545f460447928476ca76fabe55eeec8045de6de78e0a4d8afbe533c99e859122828f6fad63cb0554dc44c31bb13a66dc8d7655107a1f7c0487e8ae720825eb72c33fdce58bba16dabe95883308950c18c4ec91af62080d686cda0594a698fcd6d0d1272284e296e0b6e546aad929bdf5bb2563aa017998afaa5ea6e370cbd9ee888b84792b58d0ccff3e0920533edbb53f347470507e08959b44636b67a809bc4be6a7047942e018819e5b005f40ec2e659105f6db8a409256ff1b3a483a6080cee2f565f42560a9addbf0038d6fad1d9255b2d8bd947c04105fbba7bfc2a8b252ab7528de7d28452371526d1315832fa6c122e239e02c726c92a9ed40a67b6d2a7d5fbe35b656f82bd53d5c6523149ed5bd2a25f1d12187761f980c35c984c224f441ea13e98a7e771e04fdeae0467abb92bdac05c02b79860e7dd6ec61eb3350d2ba8293586b298df778009da0cfc6ddbf56500597f7eb7e5c2b84a649cd4a15d8e4d3dbb5c898674390cee634fcd0260e8373fdb436476cb4e50d771ff3fc479b6c4c129bcb0b0e03d7141802f574bf866cc4929c14b64bfb1fec7d47dfcffb967ea80cda9f2450256d411041fcbfe100b7ecd12a6b3e64210e13783a2a761358b04f408a1a0a4d8d0f5aff4493e085ffd5c71c9703be73319360acb63caff44e2c292bba67dbf8ea913484bdaaac6d24ca258d862d388ea71edde3499bd5b6058055be895b7c1ff9ef8b9a2e438ef614d7c2c6ba9d5b072a0271fc2370c34ec46bb79bcb36f92eeac02d342b1b7ef0141a9e978a162ebeca581236691b8ea31879080b3cad472e59a1137e853bb205f597978823fb1a50768e6bb10044142613c39de28a1eb252791a717392da132883b062ee2940b48d9b0d3f5487678f6f85abf74ef309129c2fd0a637ddec7172acbbd65b9ea052e3ac75ef39f375b8a49c7be88ea976c34bd42e1871896094ac8d35d0a00a42fbfe55ba13ea0d28dd9118334cdf680b2213aacbd74d363fd5ab7702b1c8d929b468f4707026d9231c7c0a79012fed6402fc7c61e6af886b7bd478be8ca7345ff3105c45f8dc9e69f683143933786daeaec6d9a76e2edf67f166cbfc5befff2ba27b3b3427c60abf0261fb7acbf837643b27073d9fd199310329019d295c17df5758da928fffecdd7e1a654cf91bbfdf399011377b37b988b25fd60ab2e827af19e9d846e1b9e9f2662f55a3cd4ddf1c26ef8dc2e39ec5af19c15049c56f040184c1fa75404af854ff076a6dc44c6897b7d29298e81faaf213122d31b1c77a7c8f111a06bd0813114d542d2f4f3eb6b82e4a6bad139ff9ca4377f", [[], [], []]}, 0xf01) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) lseek(r0, 0x0, 0x4) 10:42:20 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0xfffffffffffffe32) accept4(0xffffffffffffffff, &(0x7f00000010c0)=@xdp, &(0x7f0000001140)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @dev}, &(0x7f00000011c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) accept(0xffffffffffffffff, &(0x7f0000001480)=@xdp, &(0x7f0000001500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)={@multicast2, @multicast1}, &(0x7f00000016c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000001700)=@can, &(0x7f0000001780)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@dev}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @dev, @loopback}, &(0x7f0000001880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xa00, 0x0) read$FUSE(r0, &(0x7f0000000a00), 0x1000) close(r0) 10:42:20 executing program 4: stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000500)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'veth0_to_bond\x00', {0x2, 0x0, @multicast1}}) clock_getres(0x0, &(0x7f0000000140)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000240), 0x8, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000ec0)={'bcsh0\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) geteuid() 10:42:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @local, @local, 0x0, 0xfffffffffffffffb}) 10:42:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bcsf0\x00', 'lo\x00', 'ip_vti0\x00', 'team0\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe0, [@statistic={'statistic\x00', 0x18, {{0x6}}}]}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1e8) 10:42:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast2}, {}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x955f, 0x0, &(0x7f0000000080)='bridge0\x00'}) 10:42:20 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0xfffffffffffffe32) accept4(0xffffffffffffffff, &(0x7f00000010c0)=@xdp, &(0x7f0000001140)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @dev}, &(0x7f00000011c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) accept(0xffffffffffffffff, &(0x7f0000001480)=@xdp, &(0x7f0000001500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)={@multicast2, @multicast1}, &(0x7f00000016c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000001700)=@can, &(0x7f0000001780)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@dev}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @dev, @loopback}, &(0x7f0000001880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:20 executing program 3: getegid() futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:20 executing program 0: clock_nanosleep(0x40003, 0x0, &(0x7f0000000140), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000011c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001180)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001700)=0xe8) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) socket$inet(0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001880)) geteuid() getegid() getuid() getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'rose0\x00'}) 10:42:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast2}, {}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x955f, 0x0, &(0x7f0000000080)='bridge0\x00'}) 10:42:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bcsf0\x00', 'lo\x00', 'ip_vti0\x00', 'team0\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe0, [@statistic={'statistic\x00', 0x18, {{0x6}}}]}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1e8) 10:42:21 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0xfffffffffffffe32) accept4(0xffffffffffffffff, &(0x7f00000010c0)=@xdp, &(0x7f0000001140)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @dev}, &(0x7f00000011c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) accept(0xffffffffffffffff, &(0x7f0000001480)=@xdp, &(0x7f0000001500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)={@multicast2, @multicast1}, &(0x7f00000016c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000001700)=@can, &(0x7f0000001780)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@dev}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @dev, @loopback}, &(0x7f0000001880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast2}, {}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x955f, 0x0, &(0x7f0000000080)='bridge0\x00'}) 10:42:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bcsf0\x00', 'lo\x00', 'ip_vti0\x00', 'team0\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe0, [@statistic={'statistic\x00', 0x18, {{0x6}}}]}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1e8) 10:42:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffff9c}, 0x2c) 10:42:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast2}, {}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x955f, 0x0, &(0x7f0000000080)='bridge0\x00'}) 10:42:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bcsf0\x00', 'lo\x00', 'ip_vti0\x00', 'team0\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe0, [@statistic={'statistic\x00', 0x18, {{0x6}}}]}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1e8) 10:42:21 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0xfffffffffffffe32) accept4(0xffffffffffffffff, &(0x7f00000010c0)=@xdp, &(0x7f0000001140)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @dev}, &(0x7f00000011c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) accept(0xffffffffffffffff, &(0x7f0000001480)=@xdp, &(0x7f0000001500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)={@multicast2, @multicast1}, &(0x7f00000016c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000001700)=@can, &(0x7f0000001780)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@dev}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @dev, @loopback}, &(0x7f0000001880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:21 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) getgid() ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) setresgid(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000880), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) pipe2(&(0x7f0000000200), 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x0, 'client0\x00', 0x0, "cdcf8abc104c0922", "949979e5cc6e5597dd6637be33f073bea7eb70a2b3bafed120caa34d43f14fe7"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[]}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x4) truncate(&(0x7f0000000280)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da0c60fef69dc0f01ee400fbb699bc273fe13f7fafa0f66460f38286200f081768cb3c80008000081b5e5bc2b000000216b2179410fd840f40febbd090000000fd8d31ac4010d64ac1e5d71fb3e3636f7c02c33ffff") sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000500), 0xc, &(0x7f0000000780)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 10:42:21 executing program 0: clock_nanosleep(0x40003, 0x0, &(0x7f0000000140), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000011c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001180)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001700)=0xe8) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) socket$inet(0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001880)) geteuid() getegid() getuid() getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'rose0\x00'}) 10:42:21 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000500)=@nat={'nat\x00', 0x3c1, 0x1, 0x90, [0x20000580], 0x0, &(0x7f0000000000), &(0x7f0000000580)=[{}, {}, {}]}, 0x108) 10:42:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4, 0xfffffffffffffffe, 0x0) [ 196.881117] kernel msg: ebtables bug: please report to author: bad policy 10:42:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"00ac720000000000ec973f820f7c4000", 0x201}) ioctl$TUNSETGROUP(r0, 0x400454da, 0x0) 10:42:22 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) getpgrp(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=""/164, 0xa4}) syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000680)=""/122) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000580)) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000580), 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') bind$netlink(0xffffffffffffffff, &(0x7f0000000180), 0xc) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) keyctl$join(0x1, &(0x7f0000000440)) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) 10:42:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000240)={"66696c746572000080000000000000002000"}, &(0x7f00000000c0)=0xffffffa5) 10:42:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4, 0xfffffffffffffffe, 0x0) 10:42:22 executing program 5: seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) getrandom(&(0x7f00000006c0)=""/148, 0x82, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000240)}) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000880)=""/4096, &(0x7f00000000c0)=0x1000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffff9c) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 10:42:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4, 0xfffffffffffffffe, 0x0) 10:42:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4, 0xfffffffffffffffe, 0x0) 10:42:23 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) getgid() ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) setresgid(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000880), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) pipe2(&(0x7f0000000200), 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x0, 'client0\x00', 0x0, "cdcf8abc104c0922", "949979e5cc6e5597dd6637be33f073bea7eb70a2b3bafed120caa34d43f14fe7"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[]}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x4) truncate(&(0x7f0000000280)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da0c60fef69dc0f01ee400fbb699bc273fe13f7fafa0f66460f38286200f081768cb3c80008000081b5e5bc2b000000216b2179410fd840f40febbd090000000fd8d31ac4010d64ac1e5d71fb3e3636f7c02c33ffff") sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000500), 0xc, &(0x7f0000000780)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 10:42:23 executing program 4: sysinfo(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 10:42:23 executing program 0: clock_nanosleep(0x40003, 0x0, &(0x7f0000000140), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000011c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001180)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001700)=0xe8) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) socket$inet(0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001880)) geteuid() getegid() getuid() getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'rose0\x00'}) 10:42:23 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) getpgrp(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=""/164, 0xa4}) syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000680)=""/122) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000580)) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000580), 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') bind$netlink(0xffffffffffffffff, &(0x7f0000000180), 0xc) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) keyctl$join(0x1, &(0x7f0000000440)) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) 10:42:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x88, 0x1, &(0x7f0000000000), 0x3d8) 10:42:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffff9c) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 10:42:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x88, 0x1, &(0x7f0000000000), 0x3d8) 10:42:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x88, 0x1, &(0x7f0000000000), 0x3d8) 10:42:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x88, 0x1, &(0x7f0000000000), 0x3d8) 10:42:24 executing program 0: syz_emit_ethernet(0x0, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a059878769ef69dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cf0f38211ac4c10c96d9f28fc9410feefa4e2179fbe5e5c4839d0cb30080ff99e9c4010d64ac1e5d31a3b77207f0802403089f4b") 10:42:24 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffffffffffe}}, 0x1c) 10:42:24 executing program 5: accept$inet(0xffffffffffffff9c, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b766450fd3f871fb26f00fbb9500000000") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) ioprio_get$pid(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 10:42:24 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) getgid() ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) setresgid(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000880), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) pipe2(&(0x7f0000000200), 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x0, 'client0\x00', 0x0, "cdcf8abc104c0922", "949979e5cc6e5597dd6637be33f073bea7eb70a2b3bafed120caa34d43f14fe7"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[]}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x4) truncate(&(0x7f0000000280)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da0c60fef69dc0f01ee400fbb699bc273fe13f7fafa0f66460f38286200f081768cb3c80008000081b5e5bc2b000000216b2179410fd840f40febbd090000000fd8d31ac4010d64ac1e5d71fb3e3636f7c02c33ffff") sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000500), 0xc, &(0x7f0000000780)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 10:42:24 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) getpgrp(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=""/164, 0xa4}) syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000680)=""/122) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000580)) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000580), 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') bind$netlink(0xffffffffffffffff, &(0x7f0000000180), 0xc) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) keyctl$join(0x1, &(0x7f0000000440)) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) 10:42:24 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 10:42:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffff9c) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 10:42:25 executing program 0: keyctl$invalidate(0x7, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) getpgrp(0xffffffffffffffff) move_pages(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:42:25 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) getpgrp(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=""/164, 0xa4}) syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000680)=""/122) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000580)) getpgrp(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000580), 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') bind$netlink(0xffffffffffffffff, &(0x7f0000000180), 0xc) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) keyctl$join(0x1, &(0x7f0000000440)) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) 10:42:25 executing program 5: syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f00000000c0)=0x3) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f00000009c0)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f00000007c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000980), 0xffffffffffffff9e) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000009c0)=""/203, 0xcb, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000640)=""/245) syz_execute_func(&(0x7f0000000bc0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) 10:42:25 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) getgid() ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) setresgid(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000880), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) pipe2(&(0x7f0000000200), 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x0, 'client0\x00', 0x0, "cdcf8abc104c0922", "949979e5cc6e5597dd6637be33f073bea7eb70a2b3bafed120caa34d43f14fe7"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[]}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x4) truncate(&(0x7f0000000280)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da0c60fef69dc0f01ee400fbb699bc273fe13f7fafa0f66460f38286200f081768cb3c80008000081b5e5bc2b000000216b2179410fd840f40febbd090000000fd8d31ac4010d64ac1e5d71fb3e3636f7c02c33ffff") sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000500), 0xc, &(0x7f0000000780)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 10:42:25 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 10:42:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffff9c) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 10:42:26 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000002900), 0x0, 0x0, &(0x7f0000002a40)={0x0, 0x1c9c380}) pipe(&(0x7f0000000240)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000480)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getuid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000200)=0xc) getresuid(&(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) geteuid() syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:42:26 executing program 0: keyctl$invalidate(0x7, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) getpgrp(0xffffffffffffffff) move_pages(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:42:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a03b6969ef69dc00d9fbf3440f6f50e2692037370dc3393905bd060f38211a40a564a70f157a9e400f01efe5e57571f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f410f0f8084170000ae") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000140)=@xdp, &(0x7f00000001c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xfffffffffffffdcf) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000880)={0x0, @local, @multicast1}, &(0x7f00000008c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000ec0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001040)={0x0, @loopback, @broadcast}, &(0x7f0000001080)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000010c0)={@local}, &(0x7f0000001100)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003500)={'bond0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003540)={{{@in=@multicast1, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000003640)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000036c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003700)={@ipv4={[], [], @multicast2}}, &(0x7f0000003740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000003780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x131, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003940)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003980)={'bridge_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009300)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000009400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000009440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009480)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000094c0)={@ipv4={[], [], @local}}, &(0x7f0000009500)=0x14) accept(0xffffffffffffff9c, &(0x7f0000009540)=@hci, &(0x7f00000095c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000009640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009680)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000096c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000009700)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000a040)={&(0x7f0000000080), 0xc, &(0x7f000000a000)={&(0x7f0000001140)=ANY=[]}}, 0x0) 10:42:26 executing program 5: syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f00000000c0)=0x3) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f00000009c0)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f00000007c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000980), 0xffffffffffffff9e) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000009c0)=""/203, 0xcb, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000640)=""/245) syz_execute_func(&(0x7f0000000bc0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) 10:42:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:26 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 10:42:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:27 executing program 0: keyctl$invalidate(0x7, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) getpgrp(0xffffffffffffffff) move_pages(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:42:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:27 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 10:42:27 executing program 2: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000040)) r0 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x401, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003780)={&(0x7f0000002380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002400)}, {&(0x7f0000002440)=""/100, 0x64}, {&(0x7f00000024c0)=""/9, 0x9}, {&(0x7f0000002500)=""/211, 0xd3}, {&(0x7f0000002600)=""/6, 0x6}, {&(0x7f0000002640)=""/172, 0xac}], 0x6, &(0x7f0000002780)=""/4096, 0x1000, 0x6}, 0x120) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000037c0)={@local, 0x5b, r1}) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0xffffffffffffffff) fanotify_init(0x10, 0x1001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") write$P9_RLCREATE(r2, &(0x7f00000000c0)={0x18, 0xf, 0x1, {{0x80, 0x2, 0x3}, 0x8}}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) bind$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x2711, @reserved}, 0x10) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1f8, &(0x7f0000000340)=[{0x5a, 0x9, 0x9, 0x20}, {0x8, 0x5, 0x0, 0x9b}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 10:42:27 executing program 5: syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f00000000c0)=0x3) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f00000009c0)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f00000007c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000980), 0xffffffffffffff9e) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000009c0)=""/203, 0xcb, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000640)=""/245) syz_execute_func(&(0x7f0000000bc0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) 10:42:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:27 executing program 2: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dsp(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000340)) sysinfo(&(0x7f0000000400)=""/245) request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200), &(0x7f0000000500)='procvboxnet1\x00', 0xfffffffffffffffd) add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580), &(0x7f00000005c0), 0x0, 0x0) request_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000640), &(0x7f0000000680)='/dev/dsp\x00', 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/214) keyctl$dh_compute(0x17, &(0x7f00000006c0), &(0x7f0000000700)=""/120, 0x78, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/203, &(0x7f0000000040)=0xcb) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:42:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0), 0x90) close(r2) r3 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) close(r1) 10:42:28 executing program 0: keyctl$invalidate(0x7, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) getpgrp(0xffffffffffffffff) move_pages(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:42:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 10:42:28 executing program 3: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000280)) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") get_thread_area(&(0x7f0000000140)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000002c0)={'bridge0\x00'}) 10:42:28 executing program 4: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000640)={0x7}, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/xfrm_stat\x00') write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0xffbb) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@remote}, 0x20) memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000200)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) pkey_alloc(0x0, 0x0) chroot(&(0x7f00000006c0)='./file0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, &(0x7f0000000240)=0x80, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000003c0), &(0x7f00000001c0), 0x94) getrusage(0x0, &(0x7f0000000840)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={@local, @local, @ipv4={[], [], @multicast2}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 10:42:28 executing program 5: syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f00000000c0)=0x3) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f00000009c0)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f00000007c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000980), 0xffffffffffffff9e) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000009c0)=""/203, 0xcb, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000640)=""/245) syz_execute_func(&(0x7f0000000bc0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) 10:42:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:29 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:42:29 executing program 4: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000640)={0x7}, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/xfrm_stat\x00') write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0xffbb) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@remote}, 0x20) memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000200)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) pkey_alloc(0x0, 0x0) chroot(&(0x7f00000006c0)='./file0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, &(0x7f0000000240)=0x80, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000003c0), &(0x7f00000001c0), 0x94) getrusage(0x0, &(0x7f0000000840)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={@local, @local, @ipv4={[], [], @multicast2}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 10:42:29 executing program 3: io_setup(0x100000001, &(0x7f0000000180)) eventfd2(0x0, 0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000280)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000140)=""/1) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000004c0)=@generic) request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f00000003c0), &(0x7f0000000400)="6b657972696e672f76626f786e657430766d6e657431a900", 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$addseals(r0, 0x409, 0x0) 10:42:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:29 executing program 5: prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) memfd_create(&(0x7f0000000040)='/dev/input/mice\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)) prctl$getreaper(0x0, &(0x7f00000002c0)) readv(0xffffffffffffffff, &(0x7f0000000400), 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000014c0)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000500)) select(0x40, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000540)) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffb) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:42:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd1, &(0x7f0000000040), 0x4) 10:42:30 executing program 4: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000640)={0x7}, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/xfrm_stat\x00') write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0xffbb) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@remote}, 0x20) memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000200)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) pkey_alloc(0x0, 0x0) chroot(&(0x7f00000006c0)='./file0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, &(0x7f0000000240)=0x80, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000003c0), &(0x7f00000001c0), 0x94) getrusage(0x0, &(0x7f0000000840)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={@local, @local, @ipv4={[], [], @multicast2}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 10:42:30 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'sit0\x00'}) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) setitimer(0x0, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:42:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 10:42:30 executing program 3: io_setup(0x100000001, &(0x7f0000000180)) eventfd2(0x0, 0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000280)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000140)=""/1) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000004c0)=@generic) request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f00000003c0), &(0x7f0000000400)="6b657972696e672f76626f786e657430766d6e657431a900", 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0xffffff8f}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 10:42:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000680)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x388, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000300)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 10:42:31 executing program 3: io_setup(0x100000001, &(0x7f0000000180)) eventfd2(0x0, 0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000280)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000140)=""/1) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000004c0)=@generic) request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f00000003c0), &(0x7f0000000400)="6b657972696e672f76626f786e657430766d6e657431a900", 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:42:31 executing program 4: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000640)={0x7}, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/xfrm_stat\x00') write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0xffbb) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@remote}, 0x20) memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000200)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) pkey_alloc(0x0, 0x0) chroot(&(0x7f00000006c0)='./file0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, &(0x7f0000000240)=0x80, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000003c0), &(0x7f00000001c0), 0x94) getrusage(0x0, &(0x7f0000000840)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={@local, @local, @ipv4={[], [], @multicast2}}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 10:42:31 executing program 2: futex(&(0x7f00000002c0), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x0) clock_gettime(0x0, &(0x7f0000000140)) clock_settime(0x0, &(0x7f0000000080)) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) set_thread_area(&(0x7f0000000040)) dup(0xffffffffffffff9c) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000200)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e14175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 10:42:31 executing program 1: mmap(&(0x7f00009d8000/0x3000)=nil, 0x3000, 0x1, 0x1000000000002032, 0xffffffffffffffff, 0x0) mmap(&(0x7f00008b0000/0x200000)=nil, 0x200000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 10:42:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 10:42:31 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={"67726530000000f5ff0300"}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x50) 10:42:31 executing program 5: r0 = socket(0x2, 0x803, 0x3f) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @loopback}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) [ 206.881333] sock: sock_set_timeout: `syz-executor0' (pid 9108) tries to set negative timeout 10:42:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 10:42:31 executing program 3: io_setup(0x100000001, &(0x7f0000000180)) eventfd2(0x0, 0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000280)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000140)=""/1) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000004c0)=@generic) request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f00000003c0), &(0x7f0000000400)="6b657972696e672f76626f786e657430766d6e657431a900", 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 206.940699] sock: sock_set_timeout: `syz-executor0' (pid 9111) tries to set negative timeout 10:42:32 executing program 5: r0 = socket(0x2, 0x803, 0x3f) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @loopback}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 10:42:32 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 10:42:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x37, &(0x7f0000000280)="d4649039deb44c2bcb", 0x9) 10:42:32 executing program 4: clone(0x1ffffd, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@multicast1, @dev}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in6, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002080)={0x0, @loopback, @multicast1}, &(0x7f00000020c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002140)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000021c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000022c0)={{{@in=@dev, @in6=@mcast1}}, {{@in6}}}, &(0x7f00000023c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002400)={'bcsf0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000024c0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000025c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002600)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002700)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002740)={0x0, @local, @dev}, &(0x7f0000002780)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000080), 0xc, &(0x7f0000002c00)={&(0x7f00000027c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000beb000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f00000038c0)=@pppol2tp, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a00)=""/171, 0xab}}], 0x1, 0x0, 0x0) 10:42:32 executing program 5: r0 = socket(0x2, 0x803, 0x3f) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @loopback}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 10:42:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 10:42:32 executing program 5: r0 = socket(0x2, 0x803, 0x3f) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @loopback}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 10:42:32 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:32 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000beb000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f00000038c0)=@pppol2tp, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a00)=""/171, 0xab}}], 0x1, 0x0, 0x0) 10:42:32 executing program 3: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_DELETE_ELEM(0x5, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 10:42:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:33 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)={0x0, @loopback, 0x0, 0x0, 'sh\x00'}, 0x2c) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) mmap(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000580)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@dev}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={"00000000feffffffffffffff00"}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @rand_addr}, 0xc) getrandom(&(0x7f00000005c0)=""/226, 0xe2, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000003c0)=""/111) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 10:42:33 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e0000001a0081aee4050cecff0e00fa078b5bdb4cb90478485e510befccd77f3e9cf0758ef9000000b0eba06ac4", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) 10:42:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000beb000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f00000038c0)=@pppol2tp, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a00)=""/171, 0xab}}], 0x1, 0x0, 0x0) 10:42:33 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:33 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000beb000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f00000038c0)=@pppol2tp, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a00)=""/171, 0xab}}], 0x1, 0x0, 0x0) 10:42:33 executing program 4: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:33 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:42:33 executing program 4: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) r1 = gettid() mremap(&(0x7f00002ed000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) 10:42:34 executing program 0: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)={0x0, @loopback, 0x0, 0x0, 'sh\x00'}, 0x2c) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) mmap(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000580)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@dev}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={"00000000feffffffffffffff00"}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @rand_addr}, 0xc) getrandom(&(0x7f00000005c0)=""/226, 0xe2, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000003c0)=""/111) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 10:42:34 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:34 executing program 4: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f69676d703600c3") preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x124e) 10:42:34 executing program 0: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 4: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f69676d703600c3") preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x124e) 10:42:34 executing program 5: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) timerfd_create(0x0, 0x0) setitimer(0x3, &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)="6d656d6f737461a0c3d7f17400000000", 0x0, 0x0) 10:42:34 executing program 0: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 10:42:34 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x1}}) 10:42:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f69676d703600c3") preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x124e) 10:42:35 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)={0x0, @loopback, 0x0, 0x0, 'sh\x00'}, 0x2c) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) mmap(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000580)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@dev}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={"00000000feffffffffffffff00"}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @rand_addr}, 0xc) getrandom(&(0x7f00000005c0)=""/226, 0xe2, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000003c0)=""/111) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 10:42:35 executing program 0: eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}}}, &(0x7f00000006c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 10:42:35 executing program 4: r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xcf, &(0x7f0000000040), 0x370) 10:42:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f69676d703600c3") preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x124e) 10:42:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:35 executing program 1: clock_gettime(0x7, &(0x7f0000000080)) sysinfo(&(0x7f00000002c0)=""/68) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000240)='net/ip_mr_vif\x00', 0xffffffffffffffff}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000000180)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:42:35 executing program 5: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) timerfd_create(0x0, 0x0) setitimer(0x3, &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)="6d656d6f737461a0c3d7f17400000000", 0x0, 0x0) 10:42:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) unshare(0x20400) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0xfffffffffffffc39) 10:42:36 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)={0x0, @loopback, 0x0, 0x0, 'sh\x00'}, 0x2c) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) mmap(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000580)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@dev}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={"00000000feffffffffffffff00"}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @rand_addr}, 0xc) getrandom(&(0x7f00000005c0)=""/226, 0xe2, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000003c0)=""/111) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 10:42:36 executing program 0: eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}}}, &(0x7f00000006c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 10:42:36 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0xfc}, 0x10) 10:42:36 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 211.354226] RDS: rds_bind could not find a transport for ::ffff:0.0.0.252, load rds_tcp or rds_rdma? 10:42:36 executing program 1: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:42:36 executing program 4: time(&(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x0, 0x0, &(0x7f0000001900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000020c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000740), 0xc, &(0x7f0000002740)={&(0x7f00000027c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) finit_module(0xffffffffffffffff, &(0x7f00000006c0)="2e5e657468315d5e6d696d655f747970657dab00", 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x2e8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0x3ff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006f80)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000006fc0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "086c499f3268e050e23d063c0f6f0878363d3380e461f36413dadedb175a7d17ec38fcc53513442e639a43afb88b49f2ab4d3e77263111a42c33e209cdca15e10f37c5c205c4122cc252caaca4fd86e6"}, 0xd8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000700)) 10:42:36 executing program 5: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) timerfd_create(0x0, 0x0) setitimer(0x3, &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)="6d656d6f737461a0c3d7f17400000000", 0x0, 0x0) 10:42:37 executing program 0: eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}}}, &(0x7f00000006c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 10:42:37 executing program 3: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x5}, 0x10) sendmsg(r0, &(0x7f0000000200)={0x0, 0x214, &(0x7f0000000080), 0x335}, 0x0) 10:42:37 executing program 2: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000180), &(0x7f0000000200), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000400)={0x0, 0x1, 0x4, @dev}, 0x10) keyctl$negate(0xd, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@local, @empty, @multicast2}, 0xc) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:42:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f000000d8c0)=[{}], 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) recvfrom(r2, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x707000) 10:42:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000001640), 0x0) 10:42:37 executing program 4: time(&(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x0, 0x0, &(0x7f0000001900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000020c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000740), 0xc, &(0x7f0000002740)={&(0x7f00000027c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) finit_module(0xffffffffffffffff, &(0x7f00000006c0)="2e5e657468315d5e6d696d655f747970657dab00", 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x2e8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0x3ff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006f80)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000006fc0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "086c499f3268e050e23d063c0f6f0878363d3380e461f36413dadedb175a7d17ec38fcc53513442e639a43afb88b49f2ab4d3e77263111a42c33e209cdca15e10f37c5c205c4122cc252caaca4fd86e6"}, 0xd8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000700)) 10:42:37 executing program 5: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) timerfd_create(0x0, 0x0) setitimer(0x3, &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)="6d656d6f737461a0c3d7f17400000000", 0x0, 0x0) 10:42:37 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) 10:42:37 executing program 3: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:37 executing program 1: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000340)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000300), &(0x7f0000000300), 0x0, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002200)='./file0\x00', &(0x7f0000002240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005800)) stat(&(0x7f0000006200)='./file0\x00', &(0x7f0000005880)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005940)={{{@in6, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000005a40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005b00), &(0x7f0000005b40)=0xc) getuid() getgroups(0x0, &(0x7f0000005b80)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005bc0), &(0x7f0000005c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c40), &(0x7f0000005c80)=0xc) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005cc0)={{{@in=@broadcast, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005dc0)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005ec0)={{{@in6=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000005fc0)=0xe8) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006180)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000006000)}, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="42805da0530fef69dc0f01ee9741ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7440f9d00040000e2989ff046814100a4080000") 10:42:38 executing program 0: eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}}}, &(0x7f00000006c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev, @dev}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 10:42:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000480)=@abs, 0x35) 10:42:38 executing program 4: time(&(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x0, 0x0, &(0x7f0000001900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000020c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000740), 0xc, &(0x7f0000002740)={&(0x7f00000027c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) finit_module(0xffffffffffffffff, &(0x7f00000006c0)="2e5e657468315d5e6d696d655f747970657dab00", 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x2e8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0x3ff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006f80)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000006fc0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "086c499f3268e050e23d063c0f6f0878363d3380e461f36413dadedb175a7d17ec38fcc53513442e639a43afb88b49f2ab4d3e77263111a42c33e209cdca15e10f37c5c205c4122cc252caaca4fd86e6"}, 0xd8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000700)) 10:42:38 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) 10:42:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000480)=@abs, 0x35) 10:42:38 executing program 3: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:38 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) 10:42:39 executing program 1: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000880)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000480)=@abs, 0x35) 10:42:39 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) 10:42:39 executing program 0: msgget$private(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:42:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000480)=@abs, 0x35) 10:42:39 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) 10:42:39 executing program 4: time(&(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x0, 0x0, &(0x7f0000001900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000020c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000740), 0xc, &(0x7f0000002740)={&(0x7f00000027c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) finit_module(0xffffffffffffffff, &(0x7f00000006c0)="2e5e657468315d5e6d696d655f747970657dab00", 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x2e8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0x3ff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006f80)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000006fc0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "086c499f3268e050e23d063c0f6f0878363d3380e461f36413dadedb175a7d17ec38fcc53513442e639a43afb88b49f2ab4d3e77263111a42c33e209cdca15e10f37c5c205c4122cc252caaca4fd86e6"}, 0xd8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000700)) 10:42:39 executing program 2: futex(&(0x7f0000000080), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) set_tid_address(&(0x7f0000000200)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() 10:42:39 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9c421777c48ed69a179fbe5e5417545c4c3fbf049f90ec4010d64ac1e9a31a3b706e2989f4d0f6ec7") 10:42:39 executing program 3: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r0) socket(0x40000000015, 0x805, 0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x700000000000}]) 10:42:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) 10:42:40 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) [ 215.367426] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:40 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 10:42:40 executing program 2: futex(&(0x7f0000000080), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) set_tid_address(&(0x7f0000000200)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() 10:42:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000), 0xc, &(0x7f0000a3bff8)={&(0x7f0000000400)=@getlink={0x34, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc}, {0x4}}}]}, 0x34}}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x400000000000114, 0x0, 0x0) 10:42:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) 10:42:40 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 10:42:40 executing program 3: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0xfffffffffffffe4f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) [ 215.768521] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 215.902186] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:40 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x15) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 10:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) 10:42:41 executing program 0: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/152, 0x98) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), 0x8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'tunl0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 216.131813] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) [ 216.426001] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:41 executing program 2: futex(&(0x7f0000000080), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) set_tid_address(&(0x7f0000000200)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() 10:42:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000), 0xc, &(0x7f0000a3bff8)={&(0x7f0000000400)=@getlink={0x34, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc}, {0x4}}}]}, 0x34}}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x400000000000114, 0x0, 0x0) 10:42:41 executing program 1: sysinfo(&(0x7f0000000300)=""/217) socketpair$unix(0x1, 0x2000000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bcsf0\x00') 10:42:41 executing program 3: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 10:42:41 executing program 1: sysinfo(&(0x7f0000000300)=""/217) socketpair$unix(0x1, 0x2000000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bcsf0\x00') 10:42:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) 10:42:41 executing program 1: sysinfo(&(0x7f0000000300)=""/217) socketpair$unix(0x1, 0x2000000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bcsf0\x00') [ 216.995467] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:42 executing program 1: sysinfo(&(0x7f0000000300)=""/217) socketpair$unix(0x1, 0x2000000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bcsf0\x00') 10:42:42 executing program 0: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/70) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x80) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) getrlimit(0x0, &(0x7f0000000540)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r1, r2) 10:42:42 executing program 1: clock_gettime(0x80000004, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) fchmod(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0xfffffffffffffee0}, 0x14) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 217.272680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:42:42 executing program 2: futex(&(0x7f0000000080), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) set_tid_address(&(0x7f0000000200)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) getpgrp(0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() getpid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000d40)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getuid() 10:42:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000), 0xc, &(0x7f0000a3bff8)={&(0x7f0000000400)=@getlink={0x34, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc}, {0x4}}}]}, 0x34}}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x400000000000114, 0x0, 0x0) 10:42:42 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000240)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x22000430) mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0/file0\x00', 0x20000000) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 10:42:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000240)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x22000430) mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0/file0\x00', 0x20000000) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 10:42:43 executing program 0: lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) setregid(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003280)=""/239, &(0x7f0000003380)=0xef) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) clock_getres(0x0, &(0x7f0000001e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept4(r0, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, &(0x7f00000000c0)=0x80, 0x0) 10:42:43 executing program 1: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000680)={0x14}, 0x14}}, 0x40) 10:42:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000240)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x22000430) mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0/file0\x00', 0x20000000) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 10:42:43 executing program 5: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000001a00)="428055a0876969ef69dc00d9ce41ff0dc4611deed4370f38211a212bc19086d9f28fc9410feefa4e2179fbe5e50f2e1a0f59f136d3a1feefffffc463d5688dfeefffff9bbf") 10:42:43 executing program 1: clock_gettime(0x1, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000440)) timer_gettime(0x0, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) keyctl$session_to_parent(0x12) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000580)=""/144) prctl$setendian(0x14, 0x0) pkey_alloc(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={"69726c616e0200", @dev}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 10:42:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000), 0xc, &(0x7f0000a3bff8)={&(0x7f0000000400)=@getlink={0x34, 0x12, 0x209, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc}, {0x4}}}]}, 0x34}}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x400000000000114, 0x0, 0x0) 10:42:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000240)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x22000430) mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0/file0\x00', 0x20000000) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 10:42:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="f1748e825d510b6c487ca098b6b23a298b375afce90c05bb7e6f37767960b450", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000000)=""/5, 0x5) sendfile(r1, r0, &(0x7f00000024c0)=0x3b48, 0xffffffff) 10:42:43 executing program 5: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000001a00)="428055a0876969ef69dc00d9ce41ff0dc4611deed4370f38211a212bc19086d9f28fc9410feefa4e2179fbe5e50f2e1a0f59f136d3a1feefffffc463d5688dfeefffff9bbf") 10:42:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000900000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 10:42:44 executing program 3: getpgid(0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:44 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:44 executing program 5: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000001a00)="428055a0876969ef69dc00d9ce41ff0dc4611deed4370f38211a212bc19086d9f28fc9410feefa4e2179fbe5e50f2e1a0f59f136d3a1feefffffc463d5688dfeefffff9bbf") 10:42:44 executing program 5: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000001a00)="428055a0876969ef69dc00d9ce41ff0dc4611deed4370f38211a212bc19086d9f28fc9410feefa4e2179fbe5e50f2e1a0f59f136d3a1feefffffc463d5688dfeefffff9bbf") 10:42:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) 10:42:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="f1748e825d510b6c487ca098b6b23a298b375afce90c05bb7e6f37767960b450", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000000)=""/5, 0x5) sendfile(r1, r0, &(0x7f00000024c0)=0x3b48, 0xffffffff) 10:42:44 executing program 1: clock_gettime(0x1, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000440)) timer_gettime(0x0, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) keyctl$session_to_parent(0x12) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000580)=""/144) prctl$setendian(0x14, 0x0) pkey_alloc(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={"69726c616e0200", @dev}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 10:42:44 executing program 4: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2000039, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f0000000500)='/dev/dsp#\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000540)={0x18}, 0x18) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000400)={'bridge_slave_1\x00'}) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/173) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:44 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000000), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xfffffffffffffe56) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() geteuid() stat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:45 executing program 3: getpgid(0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:45 executing program 4: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) epoll_create1(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:45 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:45 executing program 1: clock_gettime(0x1, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000440)) timer_gettime(0x0, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) keyctl$session_to_parent(0x12) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000580)=""/144) prctl$setendian(0x14, 0x0) pkey_alloc(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={"69726c616e0200", @dev}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 10:42:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="f1748e825d510b6c487ca098b6b23a298b375afce90c05bb7e6f37767960b450", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000000)=""/5, 0x5) sendfile(r1, r0, &(0x7f00000024c0)=0x3b48, 0xffffffff) 10:42:46 executing program 3: getpgid(0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:46 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:46 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/207) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:42:46 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:46 executing program 1: clock_gettime(0x1, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000440)) timer_gettime(0x0, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) keyctl$session_to_parent(0x12) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000580)=""/144) prctl$setendian(0x14, 0x0) pkey_alloc(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={"69726c616e0200", @dev}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 10:42:46 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:47 executing program 3: getpgid(0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:42:47 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000080), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="f1748e825d510b6c487ca098b6b23a298b375afce90c05bb7e6f37767960b450", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000000)=""/5, 0x5) sendfile(r1, r0, &(0x7f00000024c0)=0x3b48, 0xffffffff) 10:42:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:47 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/207) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:42:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 10:42:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 10:42:48 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000001a80)='user\x00', &(0x7f0000001ac0), &(0x7f0000001b00), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001a00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001bc0)}) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgrp(0x0) getpgrp(0x0) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000002140)) 10:42:48 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x12, r1, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000740)=0x1, 0x9, 0x0) mlock(&(0x7f0000004000/0x5000)=nil, 0x5000) 10:42:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 10:42:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x4d) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000004000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 223.333129] netlink: 64 bytes leftover after parsing attributes in process `syz-executor0'. 10:42:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x48, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) [ 223.376030] netlink: 64 bytes leftover after parsing attributes in process `syz-executor0'. 10:42:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 10:42:48 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/207) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:42:48 executing program 5: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) setxattr$trusted_overlay_nlink(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='trusted.overlay.nlink\x00', &(0x7f0000000840)={'L-', 0x1}, 0x28, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000480)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpusettrustedkeyring!\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:42:48 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:42:48 executing program 0: request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000240)='keyringvmnet0!\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpgrp(0xffffffffffffffff) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getgroups(0x0, &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getpid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) geteuid() lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpgid(0x0) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}}}, &(0x7f00000018c0)=0xe8) getgroups(0x0, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) getresuid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) getgroups(0x0, &(0x7f0000000440)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) getuid() getegid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000002200)=0xc) stat(&(0x7f0000002240)='./file0\x00', &(0x7f00000002c0)) gettid() geteuid() getgid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002300)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000002400)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002440)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000024c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000025c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:42:48 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="5400000030000000000000000000000000000000400001003c00000000000c000100736b6202000000000000000008000400000000001800020000000000000000000000000006"], 0x1}}, 0x0) r0 = socket$packet(0x11, 0x802, 0x300) setsockopt$packet_int(r0, 0x107, 0x20000000001, &(0x7f00000000c0)=0x3, 0x3a) 10:42:48 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004700)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) getegid() getpid() geteuid() getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000006dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000006f00)=0xe8) getresgid(&(0x7f0000006f40), &(0x7f0000006f80), &(0x7f0000006fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007000)) lstat(&(0x7f0000007040)='./file0/file0\x00', &(0x7f0000007f80)) fstat(0xffffffffffffffff, &(0x7f0000007100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007400)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000073c0)='system!\x00system\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007440)={{{@in=@broadcast, @in=@broadcast}}, {{}, 0x0, @in6}}, &(0x7f0000007540)=0xe8) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000075c0), &(0x7f0000007600)=0xc) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 10:42:49 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000001a80)='user\x00', &(0x7f0000001ac0), &(0x7f0000001b00), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001a00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001bc0)}) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgrp(0x0) getpgrp(0x0) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000002140)) 10:42:49 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/207) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:42:49 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x1}, 0x78) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x1400}}], 0x2, 0x0) 10:42:49 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:42:49 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) [ 224.692138] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! 10:42:49 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_opts(r1, 0x0, 0x17, &(0x7f0000000040), 0x0) 10:42:49 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:42:50 executing program 5: mount(&(0x7f0000000140)=@sr0='/dev/sr0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000340)={0x60}, 0x60) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x0) 10:42:50 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004700)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) getegid() getpid() geteuid() getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000006dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000006f00)=0xe8) getresgid(&(0x7f0000006f40), &(0x7f0000006f80), &(0x7f0000006fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007000)) lstat(&(0x7f0000007040)='./file0/file0\x00', &(0x7f0000007f80)) fstat(0xffffffffffffffff, &(0x7f0000007100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007400)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000073c0)='system!\x00system\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007440)={{{@in=@broadcast, @in=@broadcast}}, {{}, 0x0, @in6}}, &(0x7f0000007540)=0xe8) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000075c0), &(0x7f0000007600)=0xc) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 10:42:50 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000001a80)='user\x00', &(0x7f0000001ac0), &(0x7f0000001b00), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001a00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001bc0)}) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgrp(0x0) getpgrp(0x0) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000002140)) 10:42:50 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:42:50 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:42:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040)=0x7f, 0x4) 10:42:50 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:42:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000bfcffc), &(0x7f0000000040)=0x4) 10:42:50 executing program 0: unshare(0x20400) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fstat(r0, &(0x7f00000002c0)) 10:42:50 executing program 0: chmod(&(0x7f0000000240)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000240)=""/43, 0x2b) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000003c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000580)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000480)) chroot(&(0x7f0000000540)='./file0\x00') lstat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) quotactl(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000880)) getpgid(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000800)="42805da0d10fef69dc0f01ee660f3a608600088041cba1d9cb3591913d06927899c4c185f64a000feefae8ed0a660fc4c19815ff2f8f09d898d5450f2e1a3828660f3831f5159f7f") 10:42:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000bfcffc), &(0x7f0000000040)=0x4) 10:42:51 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004700)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) getegid() getpid() geteuid() getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000006dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000006f00)=0xe8) getresgid(&(0x7f0000006f40), &(0x7f0000006f80), &(0x7f0000006fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007000)) lstat(&(0x7f0000007040)='./file0/file0\x00', &(0x7f0000007f80)) fstat(0xffffffffffffffff, &(0x7f0000007100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007400)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000073c0)='system!\x00system\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007440)={{{@in=@broadcast, @in=@broadcast}}, {{}, 0x0, @in6}}, &(0x7f0000007540)=0xe8) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000075c0), &(0x7f0000007600)=0xc) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 10:42:51 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) 10:42:51 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000001a80)='user\x00', &(0x7f0000001ac0), &(0x7f0000001b00), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001a00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001bc0)}) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgrp(0x0) getpgrp(0x0) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000002140)) 10:42:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000bfcffc), &(0x7f0000000040)=0x4) 10:42:51 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106, 0x0, @local, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 10:42:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000bfcffc), &(0x7f0000000040)=0x4) 10:42:51 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) 10:42:51 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:42:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_newroute={0x2c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x113, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}, @RTA_PREFSRC={0x8, 0x4, @multicast1}]}, 0x2c}}, 0x0) 10:42:51 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) 10:42:51 executing program 4: unshare(0x20400) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x200000004161, &(0x7f0000000080)) 10:42:51 executing program 0: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000004c0)={'ipvs\x00'}, &(0x7f0000000500)=0x1e) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280), 0x4) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000180)={@dev, @rand_addr}, &(0x7f00000001c0)=0xc) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:52 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004700)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) getegid() getpid() geteuid() getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000006dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000006f00)=0xe8) getresgid(&(0x7f0000006f40), &(0x7f0000006f80), &(0x7f0000006fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007000)) lstat(&(0x7f0000007040)='./file0/file0\x00', &(0x7f0000007f80)) fstat(0xffffffffffffffff, &(0x7f0000007100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007400)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000073c0)='system!\x00system\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007440)={{{@in=@broadcast, @in=@broadcast}}, {{}, 0x0, @in6}}, &(0x7f0000007540)=0xe8) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000075c0), &(0x7f0000007600)=0xc) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 10:42:52 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000180)) 10:42:52 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) 10:42:52 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000500)={@ipv4={[], [], @multicast1}}, 0x14) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000001c0)) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) time(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000700)) pipe2(&(0x7f0000000080), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580), &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffb) 10:42:52 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x23) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:42:52 executing program 5: semget(0x2, 0x0, 0x0) [ 227.395154] dccp_xmit_packet: Payload too large (65456) for featneg. 10:42:52 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='!vboxnet1selinuxcpuset+\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000400)=0xc) tgkill(0x0, 0x0, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000600)=0xe8) gettid() utime(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000001c0)=0xc) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000300)={{0x0, @remote, 0x0, 0x0, 'wlc\x00'}, {@broadcast}}, 0x44) getpid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") open(&(0x7f0000002580)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000840)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0), 0x4) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000025c0), 0xfffffe26) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000540), 0x24, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000000240), 0xc, &(0x7f0000000900)={&(0x7f0000000940)=ANY=[]}}, 0x0) getegid() 10:42:52 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x23) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000280)={@multicast1, @local}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast1, @local}, 0xc) [ 227.716995] dccp_xmit_packet: Payload too large (65456) for featneg. 10:42:52 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() exit_group(0x0) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000440)=""/38, 0x26}], 0x1, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/231, 0xe7}], 0x1, 0x0) 10:42:52 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x23) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:42:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000001780)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 10:42:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB=',rootmode=00020000000400']) 10:42:53 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") [ 228.026908] dccp_xmit_packet: Payload too large (65456) for featneg. 10:42:53 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000500)={@ipv4={[], [], @multicast1}}, 0x14) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000001c0)) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) time(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000700)) pipe2(&(0x7f0000000080), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580), &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffb) 10:42:53 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x23) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:42:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0xc, r2}, 0x14) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8), 0x71, 0x0) 10:42:53 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) [ 228.358665] dccp_xmit_packet: Payload too large (65456) for featneg. 10:42:53 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)={0x0, 0x1, 0x6, @broadcast}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000080)={0x20}, 0x20) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f00000004c0), &(0x7f0000000300)=0x60) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e53ef0442879000f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c402459304d07f") ustat(0x0, &(0x7f0000000280)) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client1\x00', 0x0, "12892f4099860962", "be891f26c88dc2249374811d50720857dae8b9336f6630e56e4678c9e771cc43"}) 10:42:53 executing program 1: lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) pipe(&(0x7f0000000040)) restart_syscall() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe2440fc72326f00fbb9500000000") 10:42:53 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:53 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0xc, r2}, 0x14) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8), 0x71, 0x0) 10:42:53 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:53 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0xc, r2}, 0x14) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8), 0x71, 0x0) 10:42:54 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000500)={@ipv4={[], [], @multicast1}}, 0x14) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000001c0)) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) time(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000700)) pipe2(&(0x7f0000000080), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580), &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffb) 10:42:54 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:54 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r0, &(0x7f0000000040), 0x174, 0x0, &(0x7f0000000040)) mq_timedreceive(r0, &(0x7f00000011c0)=""/4096, 0x93b1643f93b0cb3a, 0x0, &(0x7f0000000080)) 10:42:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0xc, r2}, 0x14) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8), 0x71, 0x0) 10:42:54 executing program 5: unshare(0x20400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)) 10:42:54 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @local, @loopback}, &(0x7f0000000400)=0xc) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:42:54 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000000fffd}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f0000001a40)=[{}], 0x1, 0x0) 10:42:54 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000080)) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000b00)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@rand_addr, @in6=@ipv4}}, {{@in=@loopback}}}, &(0x7f0000000c80)=0xe8) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d80)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000e80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001000)) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000013c0)="73797374696d03337c87331b08af2e706f7369785f61756c74007c46354e820100006c061410ae5dba2099e2181ef4ec867693abe9c7363c4353ac49c5381ba80271704860f15a790c23b00b6428f1fa59bf1a03309df56ae347f8cbd757708268321613021a103141343d72c46a8df2de839749f9dba801bf860756e8e4c053bc6e6848ed2340c3f99e5ae527bab05d49d6fc1776276c00cccb19fa2a2d61442f336de76a0c95", &(0x7f00000001c0)=ANY=[], 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000540)) 10:42:54 executing program 1: syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x6, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)=ANY=[], 0x0) getpgrp(0x0) getuid() getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) getresuid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) stat(&(0x7f0000001200)='./file0/file0\x00', &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f00000012c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001340)) stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002a00)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)="76626f786e6574302d242624cd285c00"}, 0x30) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) fstat(0xffffffffffffffff, &(0x7f0000002b00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002bc0), &(0x7f0000002c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getresuid(&(0x7f0000002cc0), &(0x7f0000002d00), &(0x7f0000002d40)) fstat(0xffffffffffffffff, &(0x7f0000002d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in=@broadcast, @in6}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000038c0), &(0x7f0000003900)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@dev, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003a40)=0xe8) getresgid(&(0x7f0000003a80), &(0x7f0000003ac0), &(0x7f0000003b00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000056c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005700)={{{@in=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000005800)=0xe8) stat(&(0x7f0000005840)='./file0/file0\x00', &(0x7f0000005880)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000380)={0xb}, 0xb) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=ANY=[], 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffffff8a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="428055a0876969ef69dc00d9909541ff3d26f20f59a8f30000000f38211a6cf51bc4c19086d9f28fc9410feefac4a24d46df4175450fc74dfe0f2e121a010d64ac1e5d31a3b786e2989f7f") 10:42:55 executing program 2: get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x80000000, &(0x7f00007e2000/0x7000)=nil, 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:42:55 executing program 5: unshare(0x20400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)) 10:42:55 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000500)={@ipv4={[], [], @multicast1}}, 0x14) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000001c0)) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) time(&(0x7f0000000040)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000700)) pipe2(&(0x7f0000000080), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580), &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffb) 10:42:55 executing program 2: get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x80000000, &(0x7f00007e2000/0x7000)=nil, 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:42:55 executing program 5: unshare(0x20400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)) 10:42:55 executing program 5: unshare(0x20400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)) 10:42:55 executing program 2: get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x80000000, &(0x7f00007e2000/0x7000)=nil, 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:42:55 executing program 5: socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001540)) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002180)) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002440)=0xe8) getgroups(0x0, &(0x7f0000002480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002bc0)) geteuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in=@local, @in6=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002d40)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e80), 0x0, 0x0) setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:42:55 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) tkill(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000004c0)) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000880)=""/242) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000002000)={'syz0\x00'}, 0x45c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffff9c, 0x50, &(0x7f0000000380)}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f00000001c0)=""/53) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@multicast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001ec0)=0xe8) getegid() stat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000002480)) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000002500)) stat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)) lstat(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b00)={{{@in=@multicast1, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003c40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6=@mcast2, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000005200)=0xe8) getgroups(0x0, &(0x7f0000005240)) getuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000054c0)={{{@in=@loopback, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000055c0)=0xe8) getgroups(0x0, &(0x7f0000005600)) stat(&(0x7f0000005640)='./file0\x00', &(0x7f0000005680)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005740)={{{@in=@local, @in=@remote}}}, &(0x7f0000005840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005880)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005980), 0x0, 0x0) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() mount$fuseblk(&(0x7f0000000580)='/dev/loop0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='fuseblk\x00', 0x0, &(0x7f0000005ac0)=ANY=[]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000500)={0x0, @empty, @loopback}, &(0x7f0000000540)=0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000600)=@can, 0x80, &(0x7f0000000900), 0x0, &(0x7f0000000980)=ANY=[]}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000680)={0x0, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='syz0\x00', 0xffffffffffffffff}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:42:55 executing program 2: get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x80000000, &(0x7f00007e2000/0x7000)=nil, 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:42:55 executing program 0: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:55 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:56 executing program 2: prctl$getname(0x10, 0xfffffffffffffffe) 10:42:56 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x2, &(0x7f0000002340)=r0, 0x4) close(r0) 10:42:56 executing program 2: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0x4d) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:42:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:56 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x2, &(0x7f0000002340)=r0, 0x4) close(r0) 10:42:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:56 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x2, &(0x7f0000002340)=r0, 0x4) close(r0) 10:42:56 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:56 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785a18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000b8d825266da4922c941303419b1f2f45be6d96e15d3cc7ad6ab61ae5acb0cacc57ea218130b3ac857bf8235edb6cffe9abafde9addecba", 0x2761, 0x0) r0 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @dev}, &(0x7f0000000540)=0xe7fc88076a197fbb) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000007c0), &(0x7f0000000200)="7f", 0x1, r3) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x0, 0x0) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000100), &(0x7f0000000280), 0x343, r0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000000700)=""/132, 0xffffff59, 0x0) 10:42:56 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x2, &(0x7f0000002340)=r0, 0x4) close(r0) 10:42:56 executing program 0: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:57 executing program 4: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) geteuid() getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:42:57 executing program 2: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0x4d) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:42:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:57 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000001940)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:42:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:57 executing program 0: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:57 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:58 executing program 4: semget$private(0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='vboxnet0em0\x00', 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000200)) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000040)=""/17) keyctl$set_reqkey_keyring(0xe, 0x0) gettid() bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0aed1d1ff69dc0f01ee660f3a6286000870808941cb3591913d06c4e1a16cdb770fc4e2b2f587fcf1000066440f76db0feefa6339172e410fe3c9c402152e8bcde1c7ea3e0f1a6e00c44379dfb9d6adbe90dfe2989f567f") open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 10:42:58 executing program 2: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0x4d) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:42:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000100), 0x10002) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 10:42:58 executing program 3: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) epoll_create(0x0) epoll_create(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:42:58 executing program 5: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000740)={0x0, &(0x7f00000004c0)}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) keyctl$invalidate(0x4, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000004c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000700)}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:58 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000300), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) sysfs$3(0x3) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:42:58 executing program 0: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:42:59 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f00000004c0)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a17a113499fee60f2e2178210d64ac1e5df33e43db4e32") 10:42:59 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000300), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) sysfs$3(0x3) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:42:59 executing program 4: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:42:59 executing program 2: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0x4d) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:42:59 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f00000004c0)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a17a113499fee60f2e2178210d64ac1e5df33e43db4e32") 10:42:59 executing program 4: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:42:59 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000300), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) sysfs$3(0x3) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:42:59 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f00000004c0)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a17a113499fee60f2e2178210d64ac1e5df33e43db4e32") 10:42:59 executing program 4: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:42:59 executing program 5: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000740)={0x0, &(0x7f00000004c0)}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) keyctl$invalidate(0x4, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000004c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000700)}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:42:59 executing program 0: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:42:59 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000300), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) sysfs$3(0x3) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:42:59 executing program 4: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:43:00 executing program 0: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:43:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fgetxattr(r0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f00000001c0)=""/216, 0xd8) 10:43:00 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f00000004c0)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a17a113499fee60f2e2178210d64ac1e5df33e43db4e32") 10:43:00 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010407031dfffd946fa2830009200a0009000100041d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:43:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000b71000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)={0x1, 0x4, 0x7, 0x80, 0x9, [{0xdf, 0x100, 0xffffffff, 0x0, 0x0, 0x40a}, {0x1, 0x7, 0x78, 0x0, 0x0, 0x8}, {0x8, 0x51ff, 0x1b53}, {0x10001, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x5, 0xfffffffffffffff8, 0x1ff, 0x0, 0x0, 0x401}, {0x0, 0x4, 0x7f, 0x0, 0x0, 0x1}, {0x2, 0x80000001, 0x100000000}, {0x428, 0x80000000, 0xfff, 0x0, 0x0, 0x481}, {0x0, 0x5, 0x5, 0x0, 0x0, 0x80}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') r2 = shmget(0x0, 0x3000, 0x0, &(0x7f0000b6e000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0be0fef699c0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5674175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffed9, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) 10:43:00 executing program 0: unshare(0x20400) r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)) 10:43:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) umount2(&(0x7f0000000080)='./file0\x00', 0xd02fba684006eb3c) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 10:43:00 executing program 5: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000740)={0x0, &(0x7f00000004c0)}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) keyctl$invalidate(0x4, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000004c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000700)}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:00 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) unshare(0x20400) vmsplice(r0, &(0x7f0000000040), 0x0, 0x0) 10:43:00 executing program 1: io_setup(0x9, &(0x7f0000000600)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000640), 0x0) socket$nl_route(0x10, 0x3, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:00 executing program 0: r0 = inotify_init1(0x0) inotify_rm_watch(r0, 0x0) 10:43:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) umount2(&(0x7f0000000080)='./file0\x00', 0xd02fba684006eb3c) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 10:43:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000b71000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)={0x1, 0x4, 0x7, 0x80, 0x9, [{0xdf, 0x100, 0xffffffff, 0x0, 0x0, 0x40a}, {0x1, 0x7, 0x78, 0x0, 0x0, 0x8}, {0x8, 0x51ff, 0x1b53}, {0x10001, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x5, 0xfffffffffffffff8, 0x1ff, 0x0, 0x0, 0x401}, {0x0, 0x4, 0x7f, 0x0, 0x0, 0x1}, {0x2, 0x80000001, 0x100000000}, {0x428, 0x80000000, 0xfff, 0x0, 0x0, 0x481}, {0x0, 0x5, 0x5, 0x0, 0x0, 0x80}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') r2 = shmget(0x0, 0x3000, 0x0, &(0x7f0000b6e000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0be0fef699c0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5674175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) umount2(&(0x7f0000000080)='./file0\x00', 0xd02fba684006eb3c) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 10:43:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) umount2(&(0x7f0000000080)='./file0\x00', 0xd02fba684006eb3c) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 10:43:00 executing program 0: r0 = inotify_init1(0x0) inotify_rm_watch(r0, 0x0) 10:43:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) unshare(0x20400) vmsplice(r0, &(0x7f0000000040), 0x0, 0x0) 10:43:01 executing program 4: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={'teql0\x00', {0x2, 0x0, @dev}}) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000780)='pkcs7_test\x00', &(0x7f00000007c0)='teql0\x00') ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000006c0)={@mcast1}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000580), 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") 10:43:01 executing program 0: r0 = inotify_init1(0x0) inotify_rm_watch(r0, 0x0) 10:43:01 executing program 5: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000740)={0x0, &(0x7f00000004c0)}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) keyctl$invalidate(0x4, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000004c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000700)}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) unshare(0x20400) vmsplice(r0, &(0x7f0000000040), 0x0, 0x0) 10:43:01 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000180)=""/184, 0xb8}], 0x2) 10:43:01 executing program 0: r0 = inotify_init1(0x0) inotify_rm_watch(r0, 0x0) 10:43:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000b71000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)={0x1, 0x4, 0x7, 0x80, 0x9, [{0xdf, 0x100, 0xffffffff, 0x0, 0x0, 0x40a}, {0x1, 0x7, 0x78, 0x0, 0x0, 0x8}, {0x8, 0x51ff, 0x1b53}, {0x10001, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x5, 0xfffffffffffffff8, 0x1ff, 0x0, 0x0, 0x401}, {0x0, 0x4, 0x7f, 0x0, 0x0, 0x1}, {0x2, 0x80000001, 0x100000000}, {0x428, 0x80000000, 0xfff, 0x0, 0x0, 0x481}, {0x0, 0x5, 0x5, 0x0, 0x0, 0x80}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') r2 = shmget(0x0, 0x3000, 0x0, &(0x7f0000b6e000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0be0fef699c0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5674175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) unshare(0x20400) vmsplice(r0, &(0x7f0000000040), 0x0, 0x0) 10:43:01 executing program 0: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) getuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@xdp, &(0x7f0000000340)=0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000100), 0xc, &(0x7f0000000740)={&(0x7f0000000800)=@gettfilter={0x24}, 0x24}}, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@deltfilter={0x24}, 0x24}}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) pipe(&(0x7f00000000c0)) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") io_setup(0x0, &(0x7f0000000280)) io_destroy(0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 10:43:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@gettaction={0x18, 0x32, 0x11, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 10:43:02 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='\x00'}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000380)) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000280), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000180)=""/139) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) socket$xdp(0x2c, 0x3, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 10:43:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000b71000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)={0x1, 0x4, 0x7, 0x80, 0x9, [{0xdf, 0x100, 0xffffffff, 0x0, 0x0, 0x40a}, {0x1, 0x7, 0x78, 0x0, 0x0, 0x8}, {0x8, 0x51ff, 0x1b53}, {0x10001, 0x2, 0x1, 0x0, 0x0, 0x1}, {0x5, 0xfffffffffffffff8, 0x1ff, 0x0, 0x0, 0x401}, {0x0, 0x4, 0x7f, 0x0, 0x0, 0x1}, {0x2, 0x80000001, 0x100000000}, {0x428, 0x80000000, 0xfff, 0x0, 0x0, 0x481}, {0x0, 0x5, 0x5, 0x0, 0x0, 0x80}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') r2 = shmget(0x0, 0x3000, 0x0, &(0x7f0000b6e000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0be0fef699c0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5674175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:02 executing program 4: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/218) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)='posix_acl_access\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_execute_func(&(0x7f0000000000)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998e6b400ba000000aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:43:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@gettaction={0x18, 0x32, 0x11, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 10:43:02 executing program 4: quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) 10:43:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@gettaction={0x18, 0x32, 0x11, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 10:43:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x1, &(0x7f0000000180)=""/193, &(0x7f0000000600)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000040)=""/83, &(0x7f0000000380)=""/181, &(0x7f0000000440)=""/141}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001900)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4008af04, &(0x7f0000000900)={0x0, 0xfffffffffffffffd, &(0x7f0000000740)=""/184, &(0x7f0000000800)=""/27, &(0x7f0000000940)=""/129}) 10:43:02 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000080)=""/243, 0x308}}, 0x4b7) 10:43:02 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x1, 0x0, 0x200}) 10:43:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@gettaction={0x18, 0x32, 0x11, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 10:43:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)={0x77359400}) 10:43:03 executing program 5: pselect6(0xfffffffffffffd63, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) inotify_init1(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:03 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x40085203, 0x0) 10:43:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe}) 10:43:03 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x1, 0x0, 0x200}) 10:43:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 10:43:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x100000) 10:43:03 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x1, 0x0, 0x200}) 10:43:03 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000001080)=@ethernet, &(0x7f0000001100)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6=@dev, @in6}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getegid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 10:43:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0xfffff000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 10:43:03 executing program 2: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000340)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:43:03 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 238.593659] validate_nla: 5 callbacks suppressed [ 238.593679] netlink: 'syz-executor3': attribute type 33 has an invalid length. 10:43:03 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x1, 0x0, 0x200}) [ 238.651652] netlink: 'syz-executor3': attribute type 33 has an invalid length. 10:43:04 executing program 5: pselect6(0xfffffffffffffd63, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) inotify_init1(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:04 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 4: unshare(0x20400) r0 = memfd_create(&(0x7f0000000240)='!lo\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)) 10:43:04 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000001180)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="0fdd2733a082", @rand_addr, @dev, @broadcast}}}}, &(0x7f0000000000)) 10:43:04 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000500)) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getgid() syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:04 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 2: inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:04 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000480), 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:43:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000000c0)=""/113) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) dup(0xffffffffffffff9c) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") socket$vsock_dgram(0x28, 0x2, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000780)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getegid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) getegid() gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) 10:43:04 executing program 5: pselect6(0xfffffffffffffd63, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) inotify_init1(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:04 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@ipv4}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000140)}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)=',)--em1!\x00'}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:43:04 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2) 10:43:05 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2) 10:43:05 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2) 10:43:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/236, 0xec, 0x0, &(0x7f0000000080)={0xa, 0x0, 0xfff, @ipv4={[], [], @multicast2}, 0xfffffffffffffff8}, 0x1c) 10:43:05 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2) 10:43:05 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000500)) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getgid() syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:05 executing program 4: setrlimit(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:43:05 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x98) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:05 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @empty, @loopback, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@ipv4={[], [], @multicast1}, @loopback, @remote, 0x0, 0x0, 0x9}) 10:43:06 executing program 5: pselect6(0xfffffffffffffd63, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) inotify_init1(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:06 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r0}, {r1}], 0x2, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340), 0x8) 10:43:06 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@ipv4}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000140)}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)=',)--em1!\x00'}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:43:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000380)="153f6234488dd25d766070") fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[@ANYBLOB], 0x1, 0x3) 10:43:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@delsa={0x28, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}}, 0x28}}, 0x0) 10:43:06 executing program 4: setrlimit(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:43:06 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:43:06 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000500)) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getgid() syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:06 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x98) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:07 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:43:07 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@ipv4}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000140)}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)=',)--em1!\x00'}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:43:07 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:43:07 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:43:07 executing program 4: setrlimit(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:43:07 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000500)) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getgid() syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:07 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:43:07 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x98) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:08 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:43:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@ipv4}}, {{@in6=@local}}}, &(0x7f0000000300)=0xe8) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000140)}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)=',)--em1!\x00'}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 10:43:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vnet(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vhost-net\x00', 0x2, 0x0) 10:43:08 executing program 4: setrlimit(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:43:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x405c5504) 10:43:08 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:43:08 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0)="13", 0x1, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da06d0fef69dc0f01eec4427d33ac12bb8000006c41fd0f2929410f3840e934030f38211ac403f96fd04dc19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000040)='user\x00', 0x0) 10:43:09 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x98) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:09 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) pipe(&(0x7f0000000480)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) gettid() getpgid(0x0) geteuid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000200)) keyctl$setperm(0x13, 0x0, 0x0) 10:43:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vnet(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vhost-net\x00', 0x2, 0x0) 10:43:09 executing program 4: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000180), 0x2, 0x0) mremap(&(0x7f0000bca000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000d83000/0x1000)=nil) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) 10:43:09 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000004c0)={0xb}, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c3366442c18700000000265cca670f38420a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:43:09 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:43:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$vsock_dgram(r1, &(0x7f0000000300)={0x28, 0x0, 0x0, @host}, 0x10) 10:43:10 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0)="13", 0x1, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da06d0fef69dc0f01eec4427d33ac12bb8000006c41fd0f2929410f3840e934030f38211ac403f96fd04dc19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000040)='user\x00', 0x0) 10:43:10 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f00000000c0), &(0x7f0000350ffc)=0x4) [ 245.356154] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 10:43:10 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000004c0)={0xb}, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c3366442c18700000000265cca670f38420a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:43:10 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffff2e}, 0x7) getresgid(&(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup(0xffffffffffffffff) getpid() 10:43:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vnet(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vhost-net\x00', 0x2, 0x0) 10:43:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x694}, 0x1c) 10:43:10 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000004c0)={0xb}, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c3366442c18700000000265cca670f38420a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:43:10 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() 10:43:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) 10:43:11 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0)="13", 0x1, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da06d0fef69dc0f01eec4427d33ac12bb8000006c41fd0f2929410f3840e934030f38211ac403f96fd04dc19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000040)='user\x00', 0x0) 10:43:11 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net//..\x00', 0x314ea2ec15e387bd, 0x0) 10:43:11 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000004c0)={0xb}, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c3366442c18700000000265cca670f38420a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:43:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1b) 10:43:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x408040) ioctl$TIOCNXCL(r0, 0x540d) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 10:43:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vnet(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vhost-net\x00', 0x2, 0x0) 10:43:11 executing program 3: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'veth1_to_bond\x00'}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 10:43:12 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() 10:43:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x408040) ioctl$TIOCNXCL(r0, 0x540d) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 10:43:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 10:43:12 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0)="13", 0x1, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da06d0fef69dc0f01eec4427d33ac12bb8000006c41fd0f2929410f3840e934030f38211ac403f96fd04dc19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000040)='user\x00', 0x0) 10:43:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 10:43:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x408040) ioctl$TIOCNXCL(r0, 0x540d) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 10:43:12 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002300)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000002400)=0xe8) getgroups(0x0, &(0x7f0000002440)) geteuid() stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) lstat(&(0x7f0000002d80)='./file1\x00', &(0x7f0000002dc0)) getegid() getuid() getgroups(0x0, &(0x7f0000002e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getgroups(0x0, &(0x7f0000002fc0)) geteuid() getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003100)=0xe8) getgroups(0x0, &(0x7f0000003140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000004a80)=0xe8) 10:43:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 10:43:12 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x100fffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000540)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) pipe(&(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x408040) ioctl$TIOCNXCL(r0, 0x540d) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 10:43:12 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0), 0x0) write(r2, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 10:43:13 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() 10:43:13 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0), 0x0) write(r2, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 10:43:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0), 0xfffffffffffffd9f) 10:43:13 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000700)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000200)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@local}}}, &(0x7f0000000b80)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f40)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001240)=0xe8) getresgid(&(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) fstat(0xffffffffffffffff, &(0x7f0000001b40)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001bc0)={{{@in6=@remote, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000001cc0)=0xe8) getgroups(0x0, &(0x7f0000001d00)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d40)={{{@in6=@loopback, @in=@remote}}, {{@in=@broadcast}}}, &(0x7f0000001e40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e80)) gettid() getuid() lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000022c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002880)='\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002a00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000029c0)='/dev/rtc0\x00'}, 0x30) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003f00)) lstat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) getresgid(&(0x7f0000004000), &(0x7f0000004040), &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004700), &(0x7f0000004740)=0xc) getuid() stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004840)) fstat(0xffffffffffffffff, &(0x7f0000004880)) getgroups(0x0, &(0x7f0000004900)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000004940)='./file0\x00', &(0x7f0000004980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004a80)) geteuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d40)={{{@in=@broadcast, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) getpgrp(0xffffffffffffffff) stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getresgid(&(0x7f0000004fc0), &(0x7f0000005000), &(0x7f0000005040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000050c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000051c0)=0xe8) getgroups(0x0, &(0x7f0000005200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005240), &(0x7f0000005280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000052c0), &(0x7f0000005300)=0xc) getgroups(0x0, &(0x7f0000005340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006940), 0x0, 0x0) init_module(&(0x7f0000000300)='/dev/rtc0\x00', 0xa, &(0x7f0000000340)=',ppp1\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:43:13 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x100fffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000540)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) pipe(&(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:13 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0), 0x0) write(r2, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 10:43:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 10:43:13 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002300)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000002400)=0xe8) getgroups(0x0, &(0x7f0000002440)) geteuid() stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) lstat(&(0x7f0000002d80)='./file1\x00', &(0x7f0000002dc0)) getegid() getuid() getgroups(0x0, &(0x7f0000002e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getgroups(0x0, &(0x7f0000002fc0)) geteuid() getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003100)=0xe8) getgroups(0x0, &(0x7f0000003140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000004a80)=0xe8) 10:43:13 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0), 0x0) write(r2, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 10:43:13 executing program 1: umount2(&(0x7f00000000c0)='./file0\x00', 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/84, &(0x7f00000001c0)=0x54) syz_execute_func(&(0x7f0000000440)="42805da0d30fef69dc0f01ee660f3a608600088041cb913591913d06c481c954882accf7fe0a0024240f78a5d6d9d6d93d23410feefaf32178660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") accept4(0xffffffffffffffff, &(0x7f00000004c0)=@nfc, &(0x7f0000000540)=0x80, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000580), 0x4) pipe2(&(0x7f0000000200), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a00)) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002bc0)={{{@in6, @in=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002e40)}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'yam0\x00'}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001780)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000002f00)) 10:43:13 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x100fffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000540)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) pipe(&(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:13 executing program 3: modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) modify_ldt$read(0x0, &(0x7f0000000040)=""/37, 0x25) 10:43:14 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() 10:43:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10, 0x6563}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x30, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x10, 0x2b, [@nested={0xc, 0x3, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}}, 0x0) [ 249.203829] netlink: 'syz-executor3': attribute type 3 has an invalid length. 10:43:14 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x100fffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000540)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) pipe(&(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 249.246848] netlink: 'syz-executor3': attribute type 3 has an invalid length. 10:43:14 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/221, 0xdd}], 0x1) 10:43:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10, 0x6563}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x30, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x10, 0x2b, [@nested={0xc, 0x3, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}}, 0x0) [ 249.565060] netlink: 'syz-executor3': attribute type 3 has an invalid length. 10:43:14 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002300)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000002400)=0xe8) getgroups(0x0, &(0x7f0000002440)) geteuid() stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) lstat(&(0x7f0000002d80)='./file1\x00', &(0x7f0000002dc0)) getegid() getuid() getgroups(0x0, &(0x7f0000002e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getgroups(0x0, &(0x7f0000002fc0)) geteuid() getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003100)=0xe8) getgroups(0x0, &(0x7f0000003140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000004a80)=0xe8) 10:43:14 executing program 4: unshare(0x20400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)={0xfffffffffffffffc}) 10:43:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10, 0x6563}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x30, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x10, 0x2b, [@nested={0xc, 0x3, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}}, 0x0) 10:43:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xa, 0x3, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/82}, 0x18) 10:43:14 executing program 1: creat(&(0x7f0000000400)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000980), &(0x7f00000009c0)=0x8) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000740)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000780), &(0x7f0000000a00)=0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) [ 249.870479] netlink: 'syz-executor3': attribute type 3 has an invalid length. 10:43:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x50, &(0x7f0000000140)=""/8, &(0x7f00000000c0)=0xfffffffffffffd8e) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x4e20, @loopback}}) 10:43:15 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:43:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10, 0x6563}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x30, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x10, 0x2b, [@nested={0xc, 0x3, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}}, 0x0) 10:43:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000705ff4)={0x10, 0x0, 0x0, 0x400000000006}, 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x72, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000000)=""/8, &(0x7f0000706ffc)=0xfc9a) 10:43:15 executing program 4: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 250.196683] netlink: 'syz-executor3': attribute type 3 has an invalid length. 10:43:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000240)) personality(0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:43:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0xfffffffffffffdca) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x32}, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() 10:43:15 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002300)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000002400)=0xe8) getgroups(0x0, &(0x7f0000002440)) geteuid() stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) lstat(&(0x7f0000002d80)='./file1\x00', &(0x7f0000002dc0)) getegid() getuid() getgroups(0x0, &(0x7f0000002e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getgroups(0x0, &(0x7f0000002fc0)) geteuid() getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003100)=0xe8) getgroups(0x0, &(0x7f0000003140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000004a80)=0xe8) 10:43:15 executing program 1: creat(&(0x7f0000000400)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000980), &(0x7f00000009c0)=0x8) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000740)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000780), &(0x7f0000000a00)=0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) 10:43:16 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000b80)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0xc5) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getgroups(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[], 0x0, 0x0) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, &(0x7f0000000400)='/dev/rtc\x00') fchmod(0xffffffffffffffff, 0x0) getgroups(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:43:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x8100, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0xd0, 0xd0, 0x100, [@vlan={'vlan\x00', 0x8}, @connlabel={'connlabel\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x2a8) 10:43:16 executing program 0: clock_gettime(0x7ffffffffffffd, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 251.422971] cannot load conntrack support for proto=7 10:43:16 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0xfffffffffffffdca) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x32}, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() 10:43:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)) 10:43:16 executing program 5: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 10:43:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='security.evm\x00') setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 10:43:16 executing program 1: creat(&(0x7f0000000400)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000980), &(0x7f00000009c0)=0x8) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000740)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000780), &(0x7f0000000a00)=0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) 10:43:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='security.evm\x00') setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 10:43:17 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000580)}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000300)=0x4) syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], &(0x7f0000000480)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ustat(0x0, &(0x7f0000000140)) gettid() getpgid(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') pipe(&(0x7f0000000a00)) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f00000000c0)}}, &(0x7f0000000340)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) connect$netlink(0xffffffffffffffff, &(0x7f0000000440), 0xc) timer_delete(0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000b00)="42805da0c6c4627925509fcec273fefefa70bf0f7c366766460f382862009b81764bc8100000c481b5e5bc2b0000002167f00fbab204000000cac054420005dae5e56b6a4126f04686648c90800f2e1ac4f04180310031a3b744dbe271fb3e3636f7c02c33ffff") 10:43:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='security.evm\x00') setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 10:43:17 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") timer_create(0x0, &(0x7f0000000700)={0x0, 0x26, 0x0, @thr={&(0x7f0000000540), &(0x7f0000000640)}}, &(0x7f0000000740)) timer_delete(0x0) 10:43:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 10:43:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='security.evm\x00') setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) [ 252.453939] netlink: 'syz-executor2': attribute type 6 has an invalid length. 10:43:17 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0xfffffffffffffdca) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x32}, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() 10:43:17 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x80e85411) 10:43:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, &(0x7f00000001c0)='bond0\x00') 10:43:17 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:43:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 10:43:17 executing program 1: creat(&(0x7f0000000400)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000980), &(0x7f00000009c0)=0x8) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000740)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000780), &(0x7f0000000a00)=0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, 0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) 10:43:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)) [ 252.855715] netlink: 'syz-executor2': attribute type 6 has an invalid length. 10:43:17 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) eventfd(0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/udp\x00') shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) getuid() getgid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000009c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000008c0)) getpgid(0xffffffffffffffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40)) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000680)=""/63}, 0x18) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000500)='syscall\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(0x0, &(0x7f0000000580)='syscall\x00') preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000200)={0x22, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 'proc'}}, 0x22) pwrite64(0xffffffffffffffff, &(0x7f0000000f80), 0x0, 0x0) creat(&(0x7f0000000440)='./file0\x00', 0x0) geteuid() sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000005c0), 0xc, &(0x7f0000000600)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) getresuid(&(0x7f0000000980), &(0x7f0000000940), &(0x7f0000000900)) getgid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000004c0)={0x10}, 0x10) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000f40), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:17 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:43:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 10:43:18 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0xfffffffdfffffc57) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, &(0x7f0000000200)=@can, &(0x7f0000000040)=0x80, 0x0) sendmmsg(r2, &(0x7f0000002c40)=[{{&(0x7f00000027c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002bc0), 0x0, &(0x7f0000000180)}}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000001500)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000013c0)=[{{&(0x7f0000000540)=@xdp, 0x73, &(0x7f0000000300), 0x73}}], 0x4000319, 0x40002061, &(0x7f0000000340)={0x0, r3+30000000}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000380)=""/199) [ 253.238036] netlink: 'syz-executor2': attribute type 6 has an invalid length. 10:43:18 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 10:43:18 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0xfffffffffffffdca) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x32}, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() 10:43:18 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000240)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000400)}) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) memfd_create(&(0x7f0000000440)="2a7472757395650770726f6300ee5417cf8b739743700b96172b68340d6657a57468d86871b76ca4b41c2b2632ed845e18e5f3ec9f41ecdb9c8b186336e11154fa530c437350ff83aeb232ae3d34cb8b5e08b70c4f9aefe19c795210", 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0xffffff40) pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x1b9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:43:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 10:43:18 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) [ 253.600722] netlink: 'syz-executor2': attribute type 6 has an invalid length. 10:43:18 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[]}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:18 executing program 2: chdir(&(0x7f0000000280)='./file1\x00') syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000740)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000200)}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000800)=@abs, &(0x7f0000000880)=0x6e, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000008c0)) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000e00), 0x10000000000001c0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) lgetxattr(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)=@known='com.apple.system.Security\x00', &(0x7f00000006c0)=""/127, 0x7f) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:18 executing program 1: futex(&(0x7f00000001c0)=0x1, 0x400000086, 0x0, &(0x7f0000000100), &(0x7f00000000c0), 0x0) 10:43:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x2002, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1002000000013) 10:43:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004780)={&(0x7f0000000040), 0xc, &(0x7f0000001700)={&(0x7f0000005e40)=@ipv6_newroute={0x20, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 10:43:19 executing program 2: chdir(&(0x7f0000000280)='./file1\x00') syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000740)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000200)}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000800)=@abs, &(0x7f0000000880)=0x6e, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000008c0)) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000e00), 0x10000000000001c0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) lgetxattr(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)=@known='com.apple.system.Security\x00', &(0x7f00000006c0)=""/127, 0x7f) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_getrule={0x20, 0x22, 0x605}, 0x20}}, 0x0) 10:43:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x2002, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1002000000013) 10:43:19 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0xb, 0x3ff, 0x10000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f0000000140), 0x1}, 0x20) 10:43:19 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000240)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000400)}) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) memfd_create(&(0x7f0000000440)="2a7472757395650770726f6300ee5417cf8b739743700b96172b68340d6657a57468d86871b76ca4b41c2b2632ed845e18e5f3ec9f41ecdb9c8b186336e11154fa530c437350ff83aeb232ae3d34cb8b5e08b70c4f9aefe19c795210", 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0xffffff40) pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x1b9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:43:19 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)) getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x0, "adaea7efc16492db900e1ec80bb700180220bd7decd8e907f26e7508c1b0c5f32c832e563512bb0cfd819d9cd710ee8cbc18e0b39e6a15585cabc2c419aaf816443c2d420b669095c3cb749c5d31a122"}, 0xd8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 10:43:19 executing program 2: chdir(&(0x7f0000000280)='./file1\x00') syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000740)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000200)}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000800)=@abs, &(0x7f0000000880)=0x6e, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000008c0)) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000e00), 0x10000000000001c0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) lgetxattr(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)=@known='com.apple.system.Security\x00', &(0x7f00000006c0)=""/127, 0x7f) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:19 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[]}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x2002, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1002000000013) 10:43:19 executing program 1: syslog(0x0, &(0x7f0000000080)=""/110, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="42805da0bd0fef69dc0f01eece73fe19fa380f3821f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f30f5b54e0480f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:43:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000440)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x2002, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1002000000013) 10:43:20 executing program 2: chdir(&(0x7f0000000280)='./file1\x00') syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000740)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000200)}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000800)=@abs, &(0x7f0000000880)=0x6e, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000008c0)) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000e00), 0x10000000000001c0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) lgetxattr(&(0x7f0000000380)='./file1\x00', &(0x7f0000000480)=@known='com.apple.system.Security\x00', &(0x7f00000006c0)=""/127, 0x7f) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x3d, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="020300000700000000000000fff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @remote}, 0x1c) 10:43:20 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012b00)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000012c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000012cc0), &(0x7f0000012d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000012fc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6}}}, &(0x7f00000130c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013100)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000013200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000013240)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000013280)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000013380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000133c0)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000014280)={&(0x7f0000000140), 0xc, &(0x7f0000014240)={&(0x7f0000013400)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:20 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340), &(0x7f00000004c0), 0x100) 10:43:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x4, 0x4000000000032, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000180), &(0x7f0000000000)=0x4) 10:43:20 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000240)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000400)}) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) memfd_create(&(0x7f0000000440)="2a7472757395650770726f6300ee5417cf8b739743700b96172b68340d6657a57468d86871b76ca4b41c2b2632ed845e18e5f3ec9f41ecdb9c8b186336e11154fa530c437350ff83aeb232ae3d34cb8b5e08b70c4f9aefe19c795210", 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0xffffff40) pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x1b9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:43:20 executing program 3: request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000080)) getrandom(&(0x7f00000006c0)=""/148, 0x82, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240), 0xc, &(0x7f00000005c0)={&(0x7f0000001880)=ANY=[]}}, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440), &(0x7f0000000700), 0x0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='children\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:20 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012b00)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000012c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000012cc0), &(0x7f0000012d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000012fc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6}}}, &(0x7f00000130c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013100)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000013200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000013240)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000013280)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000013380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000133c0)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000014280)={&(0x7f0000000140), 0xc, &(0x7f0000014240)={&(0x7f0000013400)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:20 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[]}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000040), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x27, 0xaff, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) 10:43:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf50c}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 10:43:21 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012b00)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000012c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000012cc0), &(0x7f0000012d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000012fc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6}}}, &(0x7f00000130c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013100)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000013200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000013240)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000013280)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000013380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000133c0)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000014280)={&(0x7f0000000140), 0xc, &(0x7f0000014240)={&(0x7f0000013400)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:21 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@rr={0x7, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 10:43:21 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@rr={0x7, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 10:43:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf50c}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 10:43:21 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012b00)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000012c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000012cc0), &(0x7f0000012d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000012fc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6}}}, &(0x7f00000130c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013100)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000013200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000013240)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000013280)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000013380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000133c0)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000014280)={&(0x7f0000000140), 0xc, &(0x7f0000014240)={&(0x7f0000013400)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:21 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@rr={0x7, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 10:43:21 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000240)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000400)}) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) memfd_create(&(0x7f0000000440)="2a7472757395650770726f6300ee5417cf8b739743700b96172b68340d6657a57468d86871b76ca4b41c2b2632ed845e18e5f3ec9f41ecdb9c8b186336e11154fa530c437350ff83aeb232ae3d34cb8b5e08b70c4f9aefe19c795210", 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0xffffff40) pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x1b9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:43:21 executing program 3: statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x0, &(0x7f0000000280)) 10:43:21 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[]}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:21 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@rr={0x7, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 10:43:21 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000003c0)) 10:43:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x8013, r0, 0x0) 10:43:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@gettaction={0x30, 0x32, 0x401, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0x18, 0x1, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}]}, 0x30}}, 0x0) 10:43:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf50c}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 10:43:22 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200081, 0x0) inotify_rm_watch(r0, 0x0) 10:43:22 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='mime_typevboxnet1\x00', 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) [ 257.175797] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 10:43:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:22 executing program 2: ppoll(&(0x7f00000000c0), 0x239, &(0x7f0000000080)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:22 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='mime_typevboxnet1\x00', 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) 10:43:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf50c}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 10:43:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") 10:43:22 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setgid(0x0) syz_execute_func(&(0x7f0000000140)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:43:22 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='mime_typevboxnet1\x00', 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) 10:43:23 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='mime_typevboxnet1\x00', 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) 10:43:23 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:43:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x11, 0x6558, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 10:43:23 executing program 3: semget(0xffffffffffffffff, 0x1000, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) request_key(&(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400), &(0x7f0000000440)='/dev/vcsa#\x00', 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080), 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000200)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a03b6969ef69dc00d9fbf3440f6f50e2692037370dc3393905bd060f38211a40a564a70f157a9e400f01efe5e57571f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f410f0f8084170000ae") 10:43:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0xb) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340)=0x40, 0x4) sendto$inet(r1, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) recvfrom$inet(r1, &(0x7f0000000100), 0xffffffffffffffe8, 0x0, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, 0x709000) 10:43:23 executing program 4: socket$key(0xf, 0x3, 0x2) openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) clock_gettime(0x0, &(0x7f0000000580)) recvmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000001a00)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:43:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0xb) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340)=0x40, 0x4) sendto$inet(r1, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) recvfrom$inet(r1, &(0x7f0000000100), 0xffffffffffffffe8, 0x0, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, 0x709000) 10:43:23 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @remote}, &(0x7f0000003780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000037c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000038c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000039c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003a00)={@empty, @multicast2}, &(0x7f0000003a40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003f00)={{{@in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004000)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:43:23 executing program 0: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) 10:43:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0xb) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340)=0x40, 0x4) sendto$inet(r1, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) recvfrom$inet(r1, &(0x7f0000000100), 0xffffffffffffffe8, 0x0, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, 0x709000) 10:43:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0xb) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340)=0x40, 0x4) sendto$inet(r1, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) recvfrom$inet(r1, &(0x7f0000000100), 0xffffffffffffffe8, 0x0, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, 0x709000) 10:43:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x10000000004e24, @broadcast}, 0x10) bind$inet(r1, &(0x7f0000dc7ff0)={0x2, 0x4e24, @rand_addr=0x20}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp6\x00') sendfile(r0, r3, &(0x7f0000000040), 0x80000002) 10:43:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:43:24 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000600)) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) pipe2(&(0x7f0000000800), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000c00)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000ac0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) geteuid() gettid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='rdma.current\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffff9c, 0x10, &(0x7f0000000bc0)={&(0x7f0000000b40)=""/97, 0x61, 0xffffffffffffffff}}, 0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) modify_ldt$write(0x1, &(0x7f0000000380), 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") 10:43:24 executing program 4: socket$key(0xf, 0x3, 0x2) openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) clock_gettime(0x0, &(0x7f0000000580)) recvmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000001a00)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:43:24 executing program 1: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) inotify_init() futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) sendmmsg(0xffffffffffffffff, &(0x7f0000001e40), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/49) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001fc0)={0x0, 0x1, 0x6}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:43:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000140)={0xec4, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="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"]}, 0xec4}}, 0x0) 10:43:24 executing program 0: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) 10:43:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000140)={0xec4, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="107ab6a756e3c36c2910c74eaf549377a4769b277e7fc211fb0810ae558d300a6f0f4903de8bc9b3eef40f74ec19163be21bd36526349a0f5270b1c6bf744d87956e7f91fa228028ed40eb9cf2728f56d173dfc1412964b55040c9438b4ddfa0ea2ce18936636f7d4159b619b05a85c9b6a5a8dd3bb4351d75c105698c20f6393d105e1311290d604c59672628200dbee9dec34692274f544722f2aec9f1450486fef0af7225af9fe06c4e8507cad79496a513c727b5f98b025f5da20050bca9d095b6d921f76ee791af7b76372699489557b9f7fb5ba14b9da2a20a28c94dd9d7ec3cb812b5d25cef41a2d1abfc78fa864d227f671061df7cda258793d03c4f7c18da688b74d1207b8f0e5a3cf1620dc4df6b618b7bef8a971dc531fd39d16281c1baa44726a7ef064b2c4e0a8f437f5675afe06312e08d0a5a2702e74e81d3c7e9fdeb786dc9e2b9a1df95a3cfc3fdc77859592c4d97285c24314b4d65b7207b9b1b142ae8c86f04dfde5ff7c4e258eb69f1b4af8a1af54e3721a3ee8c42fdad63429c7bfa05ab0263e2fb423da123c9b136e97dccdf5a09bac40032e1acb941ac9480d1d1716c2ddc2834418bbdf571fdee19237dbf08fa3c8300953028fba622f8dd3cf74e6089bb498e70183633a159674e7aa0b4033034015c838a764cc5558d39b553f97e66a038da03c4a45d38cb8bb8019876ee76a75b6405ca0fee725578e855c202eef8efcbd3b7ee126cbf63a8be69d26a77c82b9e6116d762cf158922884437c0965d72ca8f83ae7b9b17a2b7a7a449d21552598642037c9282a256ce00a555975bf225c45ecb1a52547a45e824200eb70ffbdadfa1366342d4787d20af3cefbac0392472e09fe0dc5c9617c39a94edfac478148e33ec28cf5167346dcf40783e09e95eab0ebc05c8251981c869d0160a571cb32aa17090c437914842310cfdf5cc9bf456b673c1387e2d216dd5a93586c1adf61fb482212ca8225387247d93fa0062b055345a1afadea04e0034917114c4228f25d6ae67527444006c78788801005d985a2a7d9149602a899c1f6105a841a0594f02cb49c82a5c287bfeddb038575bc52d622edc5ea594851c9f9d4e4e044e5692cb247397e201753dc9b5d7bafc2743a2d587af1ff727cf811ee4e6835d38ff7df258d1875388545aca5c76a6c156f52a323e7b7618d0c5d535110735133618ad582e086ace6c55ae7498f22e329f0a341b93997106b3e4dfab2b2c7a52defe56701a70435e1d51bb0ac03cdc0010a46398c22fa725c71615d0e2200648631160925d3dd98f0f166c41d69af8c3f9fb49ce70338e8cb0eaa16f7fa32652f1cc3fa41c2ae1b41a493598be72a58ba08b55177865791711130736af98894937845343c09d18a841e3eb7c2e961d1728048a6713508a1b257beaea4557e30abb21998c0c294a8b0dbe096df1d272d51dc98e918d883f3a284b429f7b9cb93393dec5c29356d805c88d625997ecaed7c097e403e35ba7383c69c4b76a6adbeb30299f2660fdfbe54db4093671dd64eafe71da81b6fd2fbf1e140d5b63d3651c69b1592ffd4d6ae96e48ae2af814f62e0201ec64464074293114131747036af65e3d6b4bf2f6698690d66d24e2ebc2d7c5a98dda1e950c5b00d5f8605492512f5a97e6661455b24a7b9617bb267a7cf96d286f2cadaf9253d5f83b8d4f8daaf49ed99d7f31b308060ad09ade5e39645f7664addf85f98678cbdde3ca85b8361da02ebf424047b7e14c7fe347afeda172a7e293104989c331290a4dbc9239ee39cb52a6fbf8d8871c6368acf6e73a237eff12d80c4e44a878ad7b94b2a277941fcc3d7d10b2b931618daf6fbf32769d1ce3e91220dd8d357854c8c2f3caacb0d166e66d926a35cfeb39a8e13c406c6b38838b531cb7aa5e256ee9d46a3c1a1e05434d74a5ca7f288be89912eb0c9b2ac0e19613870c5cf3ff6e8ae84b794718448495cd10d7de22769e6edec9ef01ff91390113f2fa12ed905511f4510b6649fbd7429ce6aba6e894b05ba054d6fa54a72484c925e28b6e820f51cc29c25b8db2111a809e35177dffa9836cd37f7dc049fed3f53118a2babcebea7bc50bd98c435dcdd4c850c957a4c987e7a40662b946c203c78172e76c7ef8614fc667b53604840875f04e2218d348964b23568bfce7351420172f8664370705d72c9a0e8c154b3eb6f43630f9c2c1e3135225480335aa2255f6752cd1427495e61f57bbbfd4a0372cd3bef535775c3f44f08ae7c4d8d5f14e81e2f550f467239226932377265a1d185f4602356be47857c53daef03ccfd1de012e09ba50d72a398e88c6cebe9fa758a7dee461bb8dd1e37f38271fd9db6898b16b7e175edf62264934caed30bad92873f0f6f73b455e48662e7050476db1c353e4db6607a9bdb703273c17bd597eb4c7734d74dccabe7bc43db88990b4fd7ec7deaa40af13bc9bb4d7ea741f876a1ee82781294a92580e5eb1cdb051edeba7f35d5d245879c1e83b36579213dda86adbd72432e815101c7640e3aea42df335229fe176eecb83249bb1017f9bc1d29452ca378d6e08a1e43665ff6d0379f81e3cedbca8c59fa5ad990b5b66a4636965953e2d0e1dc158dc950df82e66b73448765c81275f81a9fbd72978218f2b7ced46596a11b45c14197a60b7a17638332966a4ee7ae3e6792bf93dd1cdbc794de290bb5f6a48ff47e96b0425e2b2a7b2c73535145db5834fc5ae2ce8f986bf49fb03e63b6a5007c19e66b59f0371bc0df5df1d4f1c66251ac984804d769394e1568ed20c674ea1bba8c39f52fcf8536d05c123674de367b209f40c56fc0d25810d56a50120df1df2868ab6d77bae219a5d19fa15127f5b87a91ac4fac9879389d2539946f2d4b41916be358bffb798a7ce4c6645a64239e139dfd1cd96bfbead926a391ce01f713857a418724b7d6eb604acf584f378588367f00ff243cbd04dc06e054560724d8649b3fcc4a228a82bebd77cabab067e111e444a44fdb26f2c249798755470f6cdcd5262266056a34c931dccbda218ba3440b488edccecb5ef2860969db03cc6facb5042410678dece4458bc8ca2dfdde6664127c3f983ead485862b6b8bbaf5c8404f95f0c1ce780dcadef8372fd1739ae732892cc65d8ed46c3ce153bb00de7cdf0733708a456573e285988d5c3e78da49308a6d119ba0ac14e4a68422dab44a32421c2b2fd876be3279d4bc600041443bba55a3083587490e4d0ff15057dea4edd88a1541363857dcb62eff4e9b916b1c3dfa4c4858354d6e4299db217100b5a676985b5e4abd3d7470147acbf4dc0dec2e8e8d92d3e88d9e2b2e1fcf86d067e218bdbf4330b678401ecc299eda3435c2800b8ed780d11206c2fcae93c1179b875e28f9e82ba6a44ec3790e6320f31a687f54e2c22129379e5e545a2baaba9f6aa6b3f6f045e5d32b151c3f6250e27494d6aba8e56ae143638385caaa6437ba7b743a562ab0b7334ae20752ca0d63f1a06ac8b77fec4b6554234809ec8ce58d1548e92ba3fe90b73a112b5c36a27a09761dd9002c039347039ee402d55c8562464e556c20b84e68e149f8043aa62a7af95f2a15b1ef2171c119b43e0c68c1e0aaf15a5814c4427d282b9d2b587572a8296d2500a8d6178fe6afc2954df0563a2fbb90f7459cc53b0e92a9e7be882409a9b2cd956983cccb931a723459e9e76297a206093bb46d45a69840419e2b0d7a81a7138647d7ba88cbda65befe52f34af4f80b0a4570289f5f6d07a3f1cda2507b592cbeb9a7d9380e88e0592dd5584bbe81f29f6030d82de494e348d2832e218f7998f6c1c193a642315b7db1b0d62c27909b4ed08d95cc1be02e31d1297556fec6b8380999dddbcbe2585cc3c0da31440391280d2338df8220e0eb22a6c125419e35b61858eeb817d1aedb98fd9c4559b85ee0780bd2d79fc02b87e1b342eca46e114fef0b8dd3ee0cb484be2f6f6ac98f4fece429fdec50b951e40f7f03a912331e20b6a399afb90a7e582b36f152af5cdeaf460e49fa147e3c1ed4c6caa06ab929a193e648d91fb517ccc173d3564cc6ddfd6ee041ff4468d6d3359b2d221ded450e3ec2fd7b93b58a90997ccffa520bbc55bd7f2f963ffad9b45990be1087ee4554627abd97e2f9482914f18248c714b58a0876e54ea92203ac4d0ae2447a4c0e847348bd765813b3b2cfa3ea113a4d39db277839d4c40e5afa57e5e599ac331e73cea1a09c8f178fc2f2e8c4fdb526bfa063af3e2c9f44f1bc7cb6da43b098e5534a365bd73ed77b0b95dc462bccf59426fcfd2c19ce3410112c7b71301c0560444b5a4f365a258bd5eb196dbe60dfc53c00a73ed7b6f65f7f9122200fd59146cfd8308f510f98c33e71f50d18f2fc5fc11f475bd4c1e466b5faa640686f885d0bb3d9564d98f980127b592911eebf254a59e14e2a2318ba5172ebedccb576dc8eec8f510318f9a6e23cf77bd81477455ad3813f26a730e0e2060b24f868780c652bd40f1546019027a4afcaedcc18e68af128b5cc298ce006b138fa2cfa94a91e0ed54179681c575c95346c7ae680554a39e08d630f985451dedd1d6cb84ed480b2e10105ae2acc594d4b2fd991b83e63e3f641ff0997ba809094394056e1e578483de84cb47f9d1f91d40298c4a33845842264406b21204d8fc4fed5a464ec56e88fa36f4a2ab2c1c203a799c0b85431d2e1276a1789575dfe606f6c841917ced5dd820aba0e53223f6c54641366ba53f3100f1272f084e5e4321b4eb628b2771a0d0072a570c0ffb297ec9920ce69d61786b1f60dc48062c6bd45cd80000e1555e6b53d37d79c7881e156b65c0562c1b8ea7ca1bd6addb6623fa08d0c3298fcfd6c31f93126890c19f85dd3554727527375ce2493832064ed6f4f34a6f6b97a703901d5814058a17a858f47f3d89217fe50d486e13ef08cf7c3578a672c8e940c365c20199a29eeceadd7707775a39100e17840ff87de25e90b5cb7c8d60da1dea08d24f852c0cf7112dd01540b6ceeef2d8b926eb82ceb2974197ce5d328ab8d4198bc531ed4f0f17ad53822dd4014ce2264687da5240aa7a79c54ccdf2b23d3727db682a74b4945c35d249344ba7b7e1309224eabcacfd91aaf04fdf8b9048a4ee74de9edfc1ac22b5de7444b4eae744627cfa7b582ec7a23c7099f8113b43066bd0b1b999a6c7c347ba6ac453c0fbc94be6c3396562d9ba2f12b48a2d53bf1473b8b3a80a84eac6f5893896bf4b7435840f2de97dc83b25960cd5cb252db2bc9c2671e14959bbe16813ef4cc40125bbf6424ed3b92"]}, 0xec4}}, 0x0) [ 260.132728] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.158395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 10:43:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000140)={0xec4, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="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"]}, 0xec4}}, 0x0) 10:43:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000140)={0xec4, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="107ab6a756e3c36c2910c74eaf549377a4769b277e7fc211fb0810ae558d300a6f0f4903de8bc9b3eef40f74ec19163be21bd36526349a0f5270b1c6bf744d87956e7f91fa228028ed40eb9cf2728f56d173dfc1412964b55040c9438b4ddfa0ea2ce18936636f7d4159b619b05a85c9b6a5a8dd3bb4351d75c105698c20f6393d105e1311290d604c59672628200dbee9dec34692274f544722f2aec9f1450486fef0af7225af9fe06c4e8507cad79496a513c727b5f98b025f5da20050bca9d095b6d921f76ee791af7b76372699489557b9f7fb5ba14b9da2a20a28c94dd9d7ec3cb812b5d25cef41a2d1abfc78fa864d227f671061df7cda258793d03c4f7c18da688b74d1207b8f0e5a3cf1620dc4df6b618b7bef8a971dc531fd39d16281c1baa44726a7ef064b2c4e0a8f437f5675afe06312e08d0a5a2702e74e81d3c7e9fdeb786dc9e2b9a1df95a3cfc3fdc77859592c4d97285c24314b4d65b7207b9b1b142ae8c86f04dfde5ff7c4e258eb69f1b4af8a1af54e3721a3ee8c42fdad63429c7bfa05ab0263e2fb423da123c9b136e97dccdf5a09bac40032e1acb941ac9480d1d1716c2ddc2834418bbdf571fdee19237dbf08fa3c8300953028fba622f8dd3cf74e6089bb498e70183633a159674e7aa0b4033034015c838a764cc5558d39b553f97e66a038da03c4a45d38cb8bb8019876ee76a75b6405ca0fee725578e855c202eef8efcbd3b7ee126cbf63a8be69d26a77c82b9e6116d762cf158922884437c0965d72ca8f83ae7b9b17a2b7a7a449d21552598642037c9282a256ce00a555975bf225c45ecb1a52547a45e824200eb70ffbdadfa1366342d4787d20af3cefbac0392472e09fe0dc5c9617c39a94edfac478148e33ec28cf5167346dcf40783e09e95eab0ebc05c8251981c869d0160a571cb32aa17090c437914842310cfdf5cc9bf456b673c1387e2d216dd5a93586c1adf61fb482212ca8225387247d93fa0062b055345a1afadea04e0034917114c4228f25d6ae67527444006c78788801005d985a2a7d9149602a899c1f6105a841a0594f02cb49c82a5c287bfeddb038575bc52d622edc5ea594851c9f9d4e4e044e5692cb247397e201753dc9b5d7bafc2743a2d587af1ff727cf811ee4e6835d38ff7df258d1875388545aca5c76a6c156f52a323e7b7618d0c5d535110735133618ad582e086ace6c55ae7498f22e329f0a341b93997106b3e4dfab2b2c7a52defe56701a70435e1d51bb0ac03cdc0010a46398c22fa725c71615d0e2200648631160925d3dd98f0f166c41d69af8c3f9fb49ce70338e8cb0eaa16f7fa32652f1cc3fa41c2ae1b41a493598be72a58ba08b55177865791711130736af98894937845343c09d18a841e3eb7c2e961d1728048a6713508a1b257beaea4557e30abb21998c0c294a8b0dbe096df1d272d51dc98e918d883f3a284b429f7b9cb93393dec5c29356d805c88d625997ecaed7c097e403e35ba7383c69c4b76a6adbeb30299f2660fdfbe54db4093671dd64eafe71da81b6fd2fbf1e140d5b63d3651c69b1592ffd4d6ae96e48ae2af814f62e0201ec64464074293114131747036af65e3d6b4bf2f6698690d66d24e2ebc2d7c5a98dda1e950c5b00d5f8605492512f5a97e6661455b24a7b9617bb267a7cf96d286f2cadaf9253d5f83b8d4f8daaf49ed99d7f31b308060ad09ade5e39645f7664addf85f98678cbdde3ca85b8361da02ebf424047b7e14c7fe347afeda172a7e293104989c331290a4dbc9239ee39cb52a6fbf8d8871c6368acf6e73a237eff12d80c4e44a878ad7b94b2a277941fcc3d7d10b2b931618daf6fbf32769d1ce3e91220dd8d357854c8c2f3caacb0d166e66d926a35cfeb39a8e13c406c6b38838b531cb7aa5e256ee9d46a3c1a1e05434d74a5ca7f288be89912eb0c9b2ac0e19613870c5cf3ff6e8ae84b794718448495cd10d7de22769e6edec9ef01ff91390113f2fa12ed905511f4510b6649fbd7429ce6aba6e894b05ba054d6fa54a72484c925e28b6e820f51cc29c25b8db2111a809e35177dffa9836cd37f7dc049fed3f53118a2babcebea7bc50bd98c435dcdd4c850c957a4c987e7a40662b946c203c78172e76c7ef8614fc667b53604840875f04e2218d348964b23568bfce7351420172f8664370705d72c9a0e8c154b3eb6f43630f9c2c1e3135225480335aa2255f6752cd1427495e61f57bbbfd4a0372cd3bef535775c3f44f08ae7c4d8d5f14e81e2f550f467239226932377265a1d185f4602356be47857c53daef03ccfd1de012e09ba50d72a398e88c6cebe9fa758a7dee461bb8dd1e37f38271fd9db6898b16b7e175edf62264934caed30bad92873f0f6f73b455e48662e7050476db1c353e4db6607a9bdb703273c17bd597eb4c7734d74dccabe7bc43db88990b4fd7ec7deaa40af13bc9bb4d7ea741f876a1ee82781294a92580e5eb1cdb051edeba7f35d5d245879c1e83b36579213dda86adbd72432e815101c7640e3aea42df335229fe176eecb83249bb1017f9bc1d29452ca378d6e08a1e43665ff6d0379f81e3cedbca8c59fa5ad990b5b66a4636965953e2d0e1dc158dc950df82e66b73448765c81275f81a9fbd72978218f2b7ced46596a11b45c14197a60b7a17638332966a4ee7ae3e6792bf93dd1cdbc794de290bb5f6a48ff47e96b0425e2b2a7b2c73535145db5834fc5ae2ce8f986bf49fb03e63b6a5007c19e66b59f0371bc0df5df1d4f1c66251ac984804d769394e1568ed20c674ea1bba8c39f52fcf8536d05c123674de367b209f40c56fc0d25810d56a50120df1df2868ab6d77bae219a5d19fa15127f5b87a91ac4fac9879389d2539946f2d4b41916be358bffb798a7ce4c6645a64239e139dfd1cd96bfbead926a391ce01f713857a418724b7d6eb604acf584f378588367f00ff243cbd04dc06e054560724d8649b3fcc4a228a82bebd77cabab067e111e444a44fdb26f2c249798755470f6cdcd5262266056a34c931dccbda218ba3440b488edccecb5ef2860969db03cc6facb5042410678dece4458bc8ca2dfdde6664127c3f983ead485862b6b8bbaf5c8404f95f0c1ce780dcadef8372fd1739ae732892cc65d8ed46c3ce153bb00de7cdf0733708a456573e285988d5c3e78da49308a6d119ba0ac14e4a68422dab44a32421c2b2fd876be3279d4bc600041443bba55a3083587490e4d0ff15057dea4edd88a1541363857dcb62eff4e9b916b1c3dfa4c4858354d6e4299db217100b5a676985b5e4abd3d7470147acbf4dc0dec2e8e8d92d3e88d9e2b2e1fcf86d067e218bdbf4330b678401ecc299eda3435c2800b8ed780d11206c2fcae93c1179b875e28f9e82ba6a44ec3790e6320f31a687f54e2c22129379e5e545a2baaba9f6aa6b3f6f045e5d32b151c3f6250e27494d6aba8e56ae143638385caaa6437ba7b743a562ab0b7334ae20752ca0d63f1a06ac8b77fec4b6554234809ec8ce58d1548e92ba3fe90b73a112b5c36a27a09761dd9002c039347039ee402d55c8562464e556c20b84e68e149f8043aa62a7af95f2a15b1ef2171c119b43e0c68c1e0aaf15a5814c4427d282b9d2b587572a8296d2500a8d6178fe6afc2954df0563a2fbb90f7459cc53b0e92a9e7be882409a9b2cd956983cccb931a723459e9e76297a206093bb46d45a69840419e2b0d7a81a7138647d7ba88cbda65befe52f34af4f80b0a4570289f5f6d07a3f1cda2507b592cbeb9a7d9380e88e0592dd5584bbe81f29f6030d82de494e348d2832e218f7998f6c1c193a642315b7db1b0d62c27909b4ed08d95cc1be02e31d1297556fec6b8380999dddbcbe2585cc3c0da31440391280d2338df8220e0eb22a6c125419e35b61858eeb817d1aedb98fd9c4559b85ee0780bd2d79fc02b87e1b342eca46e114fef0b8dd3ee0cb484be2f6f6ac98f4fece429fdec50b951e40f7f03a912331e20b6a399afb90a7e582b36f152af5cdeaf460e49fa147e3c1ed4c6caa06ab929a193e648d91fb517ccc173d3564cc6ddfd6ee041ff4468d6d3359b2d221ded450e3ec2fd7b93b58a90997ccffa520bbc55bd7f2f963ffad9b45990be1087ee4554627abd97e2f9482914f18248c714b58a0876e54ea92203ac4d0ae2447a4c0e847348bd765813b3b2cfa3ea113a4d39db277839d4c40e5afa57e5e599ac331e73cea1a09c8f178fc2f2e8c4fdb526bfa063af3e2c9f44f1bc7cb6da43b098e5534a365bd73ed77b0b95dc462bccf59426fcfd2c19ce3410112c7b71301c0560444b5a4f365a258bd5eb196dbe60dfc53c00a73ed7b6f65f7f9122200fd59146cfd8308f510f98c33e71f50d18f2fc5fc11f475bd4c1e466b5faa640686f885d0bb3d9564d98f980127b592911eebf254a59e14e2a2318ba5172ebedccb576dc8eec8f510318f9a6e23cf77bd81477455ad3813f26a730e0e2060b24f868780c652bd40f1546019027a4afcaedcc18e68af128b5cc298ce006b138fa2cfa94a91e0ed54179681c575c95346c7ae680554a39e08d630f985451dedd1d6cb84ed480b2e10105ae2acc594d4b2fd991b83e63e3f641ff0997ba809094394056e1e578483de84cb47f9d1f91d40298c4a33845842264406b21204d8fc4fed5a464ec56e88fa36f4a2ab2c1c203a799c0b85431d2e1276a1789575dfe606f6c841917ced5dd820aba0e53223f6c54641366ba53f3100f1272f084e5e4321b4eb628b2771a0d0072a570c0ffb297ec9920ce69d61786b1f60dc48062c6bd45cd80000e1555e6b53d37d79c7881e156b65c0562c1b8ea7ca1bd6addb6623fa08d0c3298fcfd6c31f93126890c19f85dd3554727527375ce2493832064ed6f4f34a6f6b97a703901d5814058a17a858f47f3d89217fe50d486e13ef08cf7c3578a672c8e940c365c20199a29eeceadd7707775a39100e17840ff87de25e90b5cb7c8d60da1dea08d24f852c0cf7112dd01540b6ceeef2d8b926eb82ceb2974197ce5d328ab8d4198bc531ed4f0f17ad53822dd4014ce2264687da5240aa7a79c54ccdf2b23d3727db682a74b4945c35d249344ba7b7e1309224eabcacfd91aaf04fdf8b9048a4ee74de9edfc1ac22b5de7444b4eae744627cfa7b582ec7a23c7099f8113b43066bd0b1b999a6c7c347ba6ac453c0fbc94be6c3396562d9ba2f12b48a2d53bf1473b8b3a80a84eac6f5893896bf4b7435840f2de97dc83b25960cd5cb252db2bc9c2671e14959bbe16813ef4cc40125bbf6424ed3b92"]}, 0xec4}}, 0x0) 10:43:25 executing program 4: socket$key(0xf, 0x3, 0x2) openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) clock_gettime(0x0, &(0x7f0000000580)) recvmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000001a00)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:43:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000800, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:43:25 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000600)) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) pipe2(&(0x7f0000000800), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000c00)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000ac0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) geteuid() gettid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='rdma.current\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffff9c, 0x10, &(0x7f0000000bc0)={&(0x7f0000000b40)=""/97, 0x61, 0xffffffffffffffff}}, 0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) modify_ldt$write(0x1, &(0x7f0000000380), 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") [ 260.787047] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.809736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 260.846051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.860180] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.866649] bridge0: port 1(bridge_slave_0) entered forwarding state 10:43:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000500)="428055a059878769ef69dc7cd9f0008f00008020c421fa7fb432322333331837370f38211ac4c10c96d9f28fc9410feefa4e2179fbe5e5417545c4839d0cb30080ff99e9c4010d64ac1e5d31a3b77207f0802403089f4b") seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getpgrp(0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getgid() signalfd4(0xffffffffffffffff, &(0x7f0000000780), 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in, @in=@loopback}}, {{@in6=@dev}}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) geteuid() 10:43:25 executing program 0: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) 10:43:25 executing program 1: eventfd(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'ip6gretap0\x00'}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 261.252395] audit: type=1326 audit(1536921806.262:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11303 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:43:26 executing program 4: socket$key(0xf, 0x3, 0x2) openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) clock_gettime(0x0, &(0x7f0000000580)) recvmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000001a00)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 10:43:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000800, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:43:26 executing program 0: pipe(&(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x8) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f547f3766460f3838523044c190c42119f3bd8b51aa0762788f77c935c977197a0779fbc46376fd7998b400c6000000aaff43d0e1460f0da11b000000010d64ac1e5dc442fd318ff6eb000005d9e0987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001a80)=""/4096) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) 10:43:26 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000080), 0x1) [ 261.917510] audit: type=1326 audit(1536921806.927:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11303 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:43:27 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000600)) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) pipe2(&(0x7f0000000800), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000c00)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000ac0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) geteuid() gettid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='rdma.current\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffff9c, 0x10, &(0x7f0000000bc0)={&(0x7f0000000b40)=""/97, 0x61, 0xffffffffffffffff}}, 0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) modify_ldt$write(0x1, &(0x7f0000000380), 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") 10:43:27 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) 10:43:27 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="f2d068120d5994634f4766eb8762587691f0fd98be16e0b7f7d8faf41a8304cd000004000000dfea51e02c67afeecd86e0d1787df74c62850ca187ddfcf576e1aa80000040a3c319f0a8ac97c066c3ca42ebf5c4ed1c080000000000000025aabd7f00edaa4339d3f450c99e3d2d82574765f046d06f5b95afc8c7d4f7000000009ab4155cca6f5c791f98da000ff4651f78510425f55631d38081d012f2d2cfc9cc2c453a4d9e737d060a96a2651c3d9a469f2a81f1a259e147d54e983c9b38e6773f646fc0c936a2f7721fc6ed6eeddc6efb42155e1efcd5ba5d48dd15e8e8d0b95a5197e721261040d5f7e995dd3fd9050ab9dcd81b9bf077fda873be959067876c5f495162c13d727dffca0a174b2409c87d008974eba424983cac4156a00d6b1667a5c8515ba13851", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:27 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:27 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000800, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:43:27 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:27 executing program 0: getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getegid() setregid(0x0, 0x0) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000b80)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000004c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 10:43:27 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:27 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:28 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000600)) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) pipe2(&(0x7f0000000800), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000c00)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000ac0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) geteuid() gettid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='rdma.current\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffff9c, 0x10, &(0x7f0000000bc0)={&(0x7f0000000b40)=""/97, 0x61, 0xffffffffffffffff}}, 0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) modify_ldt$write(0x1, &(0x7f0000000380), 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") [ 263.063422] audit: type=1326 audit(1536921808.073:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11351 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:43:28 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) 10:43:28 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f00000002c0)="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", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) 10:43:28 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000240)) syz_execute_func(&(0x7f00000002c0)="42568055a07a7a69ef69dc00d990c841ff0f1837c4820909e538d4c4022d9b65fec481a973f05be5e5c422c98c56002b74742e1a1a010d64ac1e5d9f66420f3a16763000") socket$rds(0x15, 0x5, 0x0) 10:43:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 10:43:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000800, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:43:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 10:43:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 10:43:28 executing program 0: unshare(0x20400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x800000031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x802000000008982, &(0x7f0000000080)) 10:43:29 executing program 0: unshare(0x20400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x800000031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x802000000008982, &(0x7f0000000080)) 10:43:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 10:43:29 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) 10:43:29 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000240)) syz_execute_func(&(0x7f00000002c0)="42568055a07a7a69ef69dc00d990c841ff0f1837c4820909e538d4c4022d9b65fec481a973f05be5e5c422c98c56002b74742e1a1a010d64ac1e5d9f66420f3a16763000") socket$rds(0x15, 0x5, 0x0) 10:43:29 executing program 0: unshare(0x20400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x800000031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x802000000008982, &(0x7f0000000080)) 10:43:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x1, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}}, &(0x7f0000000240)="47504c0083ff130f5fb00e5d5b644354b6e27770c5a6241e8defd6533e2ae106be655c6c526349216c30bb1f80fb450ec0d5be", 0x3, 0x99, &(0x7f0000000280)=""/153}, 0x48) 10:43:29 executing program 4: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000200)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:43:29 executing program 0: unshare(0x20400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x800000031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x802000000008982, &(0x7f0000000080)) 10:43:29 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:29 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x24) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000340)=""/117, 0x75}], 0x1) 10:43:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) bind$unix(r1, &(0x7f0000d77000)=@abs, 0x0) 10:43:29 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@rand_addr}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0xffffffffffffff17) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000200)='illinois\x00', 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getgroups(0x0, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0xe, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local, 'irlan0\x00'}}, 0x80) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@sco, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:29 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc00d1ce22ff0f50e596e596e538211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:43:30 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) 10:43:30 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000240)) syz_execute_func(&(0x7f00000002c0)="42568055a07a7a69ef69dc00d990c841ff0f1837c4820909e538d4c4022d9b65fec481a973f05be5e5c422c98c56002b74742e1a1a010d64ac1e5d9f66420f3a16763000") socket$rds(0x15, 0x5, 0x0) 10:43:30 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@rand_addr}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0xffffffffffffff17) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000200)='illinois\x00', 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getgroups(0x0, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0xe, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local, 'irlan0\x00'}}, 0x80) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@sco, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:30 executing program 4: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000200)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:43:30 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:30 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@rand_addr}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0xffffffffffffff17) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000200)='illinois\x00', 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getgroups(0x0, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0xe, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local, 'irlan0\x00'}}, 0x80) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@sco, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:30 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc00d1ce22ff0f50e596e596e538211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 266.161277] input: syz1 as /devices/virtual/input/input7 10:43:31 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000240)) syz_execute_func(&(0x7f00000002c0)="42568055a07a7a69ef69dc00d990c841ff0f1837c4820909e538d4c4022d9b65fec481a973f05be5e5c422c98c56002b74742e1a1a010d64ac1e5d9f66420f3a16763000") socket$rds(0x15, 0x5, 0x0) [ 266.205491] input: syz1 as /devices/virtual/input/input8 10:43:31 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@rand_addr}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0xffffffffffffff17) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000200)='illinois\x00', 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getgroups(0x0, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0xe, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local, 'irlan0\x00'}}, 0x80) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@sco, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:43:31 executing program 4: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000200)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:43:31 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 266.497058] input: syz1 as /devices/virtual/input/input9 10:43:31 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc00d1ce22ff0f50e596e596e538211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:43:31 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 266.837124] input: syz1 as /devices/virtual/input/input10 [ 266.955816] input: syz1 as /devices/virtual/input/input11 10:43:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:43:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:43:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x8000210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$RTC_RD_TIME(r0, 0x800c6613, &(0x7f00000000c0)) [ 267.205759] input: syz1 as /devices/virtual/input/input12 [ 267.240879] input: syz1 as /devices/virtual/input/input13 10:43:32 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getcwd(&(0x7f0000000200)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 10:43:32 executing program 2: ustat(0x0, &(0x7f0000000080)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@random={'os2.', 'encrypted\x00'}, &(0x7f0000000280)=""/63, 0x3f) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x10, &(0x7f00000006c0)={&(0x7f0000000540)=""/52, 0x34, 0xffffffffffffffff}}, 0x10) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000840)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x10, &(0x7f00000007c0)={&(0x7f0000000500)=""/19, 0x13}}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, 0xe8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:43:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00', 0x56}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:43:32 executing program 4: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000200)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 267.556428] input: syz1 as /devices/virtual/input/input14 10:43:32 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:32 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) 10:43:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x18050000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 10:43:32 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc00d1ce22ff0f50e596e596e538211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:43:32 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) 10:43:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x18050000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 10:43:33 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) 10:43:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x18050000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 10:43:33 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) 10:43:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f0000000080)=@ethtool_ringparam={0x11}}) 10:43:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x18050000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 10:43:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) unshare(0x2000400) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) 10:43:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000001, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffedf, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) dup2(r1, r0) 10:43:33 executing program 3: r0 = socket$packet(0x11, 0x4000000000003, 0x300) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:43:33 executing program 5: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000340)) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f00000048c0), 0xffffffffffffffff, &(0x7f0000004900), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0x8) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() modify_ldt$read(0x0, &(0x7f0000004a00)=""/255, 0xff) fremovexattr(0xffffffffffffffff, &(0x7f0000004940)=@known='trusted.overlay.nlink\x00') getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000049c0)="428055a06b6969ef69dc00d99069203637c3397c2aaf200ffc66450f71e43864a70f71f70f400f01efe5e57d0fec1a1a01460f01ee31a3b786e2989f") 10:43:33 executing program 2: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:43:33 executing program 3: r0 = socket$packet(0x11, 0x4000000000003, 0x300) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:43:33 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) getgid() setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 10:43:33 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) unshare(0x2000400) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) 10:43:34 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:34 executing program 3: r0 = socket$packet(0x11, 0x4000000000003, 0x300) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:43:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) unshare(0x2000400) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) 10:43:34 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:34 executing program 3: r0 = socket$packet(0x11, 0x4000000000003, 0x300) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:43:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) unshare(0x2000400) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) 10:43:34 executing program 5: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000340)) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f00000048c0), 0xffffffffffffffff, &(0x7f0000004900), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0x8) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() modify_ldt$read(0x0, &(0x7f0000004a00)=""/255, 0xff) fremovexattr(0xffffffffffffffff, &(0x7f0000004940)=@known='trusted.overlay.nlink\x00') getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000049c0)="428055a06b6969ef69dc00d99069203637c3397c2aaf200ffc66450f71e43864a70f71f70f400f01efe5e57d0fec1a1a01460f01ee31a3b786e2989f") 10:43:34 executing program 2: r0 = socket$inet(0x10, 0x2, 0xc) r1 = memfd_create(&(0x7f0000000000)='{-trusted\x00', 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @local}}}, 0x90) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000010607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:43:34 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) [ 269.917961] netlink: 'syz-executor2': attribute type 1 has an invalid length. 10:43:34 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x7}) poll(&(0x7f0000000080)=[{r1}, {r2, 0x2060}], 0x2, 0x0) 10:43:34 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:34 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:43:35 executing program 4: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@loopback}, &(0x7f0000000e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000002700), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0xfc2fb0490f39fca, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 10:43:35 executing program 2: r0 = socket$inet(0x10, 0x2, 0xc) r1 = memfd_create(&(0x7f0000000000)='{-trusted\x00', 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @local}}}, 0x90) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000010607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 270.139373] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 270.141101] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.153689] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.160481] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.167290] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.174095] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.180952] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.187792] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.194665] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.201475] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.208267] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 270.215061] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 10:43:35 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:35 executing program 2: r0 = socket$inet(0x10, 0x2, 0xc) r1 = memfd_create(&(0x7f0000000000)='{-trusted\x00', 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @local}}}, 0x90) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000010607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 270.240430] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 10:43:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f000000d640), 0x0, 0x0, &(0x7f000000d8c0)) getpeername$packet(0xffffffffffffffff, &(0x7f000000d900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d940)=0x14) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 270.388384] netlink: 'syz-executor2': attribute type 1 has an invalid length. 10:43:35 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 10:43:35 executing program 5: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000340)) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f00000048c0), 0xffffffffffffffff, &(0x7f0000004900), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0x8) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() modify_ldt$read(0x0, &(0x7f0000004a00)=""/255, 0xff) fremovexattr(0xffffffffffffffff, &(0x7f0000004940)=@known='trusted.overlay.nlink\x00') getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000049c0)="428055a06b6969ef69dc00d99069203637c3397c2aaf200ffc66450f71e43864a70f71f70f400f01efe5e57d0fec1a1a01460f01ee31a3b786e2989f") 10:43:35 executing program 2: r0 = socket$inet(0x10, 0x2, 0xc) r1 = memfd_create(&(0x7f0000000000)='{-trusted\x00', 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @local}}}, 0x90) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000010607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:43:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) [ 270.780911] netlink: 'syz-executor2': attribute type 1 has an invalid length. 10:43:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 10:43:35 executing program 2: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x0, 0x3, &(0x7f0000000140), &(0x7f0000000000)='GPL\x00', 0x0, 0x1000, &(0x7f0000000240)=""/4096}, 0x48) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000001340)="428055a0610fef69dce9d92a5c41ff0f1837370f3821ab1ac4c482fd252041c0c7c7ee72ee7279fbe5f5d075455de0932ebc2ebc0d64ac1e5d9f7f") [ 270.901260] cgroup: fork rejected by pids controller in /syz4 10:43:36 executing program 1: memfd_create(&(0x7f0000000040)='bdev#W\x00', 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x0, 0x2a, [], 0x0, &(0x7f0000000140), &(0x7f00000000c0)=""/42}, &(0x7f00000002c0)=0x78) clock_getres(0x0, &(0x7f00000014c0)) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) memfd_create(&(0x7f00000003c0)='nat\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000180)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000140)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:43:36 executing program 4: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@loopback}, &(0x7f0000000e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000002700), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0xfc2fb0490f39fca, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 10:43:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 10:43:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x20000000000000e, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 10:43:36 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=@raw={'raw\x00', 0x9, 0x3, 0x230, 0x0, 0x108, 0x0, 0x108, 0x108, 0x258, 0x258, 0x258, 0x258, 0x258, 0x3, &(0x7f0000000540), {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'erspan0\x00', 'team0\x00'}, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'team0\x00', 'irlan0\x00'}, 0x0, 0x98, 0xe0}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x290) clone(0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000700), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) geteuid() ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000740)=""/210) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xc) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) getegid() socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x0, @dev}}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:43:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000040), 0x0) 10:43:36 executing program 5: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000340)) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f00000048c0), 0xffffffffffffffff, &(0x7f0000004900), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0x8) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() modify_ldt$read(0x0, &(0x7f0000004a00)=""/255, 0xff) fremovexattr(0xffffffffffffffff, &(0x7f0000004940)=@known='trusted.overlay.nlink\x00') getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000049c0)="428055a06b6969ef69dc00d99069203637c3397c2aaf200ffc66450f71e43864a70f71f70f400f01efe5e57d0fec1a1a01460f01ee31a3b786e2989f") 10:43:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000040), 0x0) 10:43:36 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140), 0x4) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000040), 0x0) 10:43:37 executing program 1: timerfd_create(0x7, 0x0) pipe(&(0x7f0000000400)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)='rfc7539esp(cbc-camellia-aesni-avx2,tgr160-generic)\x00') dup2(0xffffffffffffffff, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0), 0x4) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000003c0)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000980)={'nat\x00'}, &(0x7f0000000300)=0x24) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f00000001c0)}) getgid() syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) 10:43:37 executing program 4: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@loopback}, &(0x7f0000000e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000002700), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0xfc2fb0490f39fca, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 10:43:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000040), 0x0) 10:43:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 10:43:37 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="24000000220007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 10:43:37 executing program 5: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/raw\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) umount2(&(0x7f00000006c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000600)="0f401eeef689929d10914f300487dadc", 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) memfd_create(&(0x7f0000000200)='\x00', 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000540)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "582c38a659d9061b82cef73d79a5ccfbef17e6a76a8a650bc15b2994e95c7982ee6d2daa623a32ea97f1271379f98cd357ce0319193cd014e0efffdfc976db30", "2264ca879ae8f4de89365fa49bc966a213f6af9acce81faef5350dfe3f337d3414eff2f29a19647d7bf84aaeccf2a119e1d803df6c4ac9dd0e0067b7adb5fa37", "2c9748c4bcbcded20622f07bdee12f220e581de2fc391d10efc7952f0baa2d23"}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 10:43:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 10:43:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 10:43:38 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140), 0x4) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:38 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:43:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 10:43:38 executing program 4: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@loopback}, &(0x7f0000000e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000002700), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0xfc2fb0490f39fca, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 10:43:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 10:43:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x2d, 0x6, 0x0, {0x0, 0x1, 0x4, 0x0, 'wlc\x00'}}, 0x2d) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x80000000000000, 0x0, 'wlc\x00'}, 0x2c) close(r1) 10:43:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 10:43:38 executing program 3: r0 = socket(0x1e, 0x80005, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x8) 10:43:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 10:43:38 executing program 5: clock_gettime(0x0, &(0x7f0000000200)) pipe(&(0x7f0000000d40)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @remote}, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) getegid() getgroups(0x0, &(0x7f0000007600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getuid() getgroups(0x0, &(0x7f0000000c00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@mcast1}}}, &(0x7f0000000a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xe8) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f0000001080)) geteuid() stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003880)={{{@in=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003980)=0xe8) getgid() getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003a80)) fstat(0xffffffffffffffff, &(0x7f0000003b00)) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000003c40)) getuid() getgroups(0x0, &(0x7f0000005000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005040)={{{@in6=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000005140)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000006440)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007840), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:43:39 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340), &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140), 0x4) dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:43:39 executing program 3: r0 = socket(0x1e, 0x80005, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x8) 10:43:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x2d, 0x6, 0x0, {0x0, 0x1, 0x4, 0x0, 'wlc\x00'}}, 0x2d) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x80000000000000, 0x0, 'wlc\x00'}, 0x2c) close(r1) 10:43:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x2d, 0x6, 0x0, {0x0, 0x1, 0x4, 0x0, 'wlc\x00'}}, 0x2d) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x80000000000000, 0x0, 'wlc\x00'}, 0x2c) close(r1) 10:43:39 executing program 5: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xfd) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:43:39 executing program 3: r0 = socket(0x1e, 0x80005, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x8) 10:43:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 10:43:39 executing program 3: r0 = socket(0x1e, 0x80005, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x8) [ 274.651638] ================================================================== [ 274.659082] BUG: KMSAN: uninit-value in __kmalloc_node+0xb2d/0x11c0 [ 274.665523] CPU: 1 PID: 11839 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #48 [ 274.672815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.682179] Call Trace: [ 274.684796] dump_stack+0x14b/0x190 [ 274.688458] kmsan_report+0x183/0x2b0 [ 274.692289] __msan_warning+0x70/0xc0 [ 274.696154] __kmalloc_node+0xb2d/0x11c0 [ 274.700254] ? kmsan_set_origin_inline+0x6b/0x120 [ 274.705134] ? __get_vm_area_node+0x27b/0x800 [ 274.709680] __get_vm_area_node+0x27b/0x800 [ 274.714049] __vmalloc_node_range+0x32e/0x1140 [ 274.718662] ? netlink_sendmsg+0xbbd/0x1290 [ 274.723032] vmalloc+0xd8/0xf0 [ 274.726247] ? netlink_sendmsg+0xbbd/0x1290 [ 274.730772] netlink_sendmsg+0xbbd/0x1290 [ 274.734968] ? netlink_getsockopt+0x11c0/0x11c0 [ 274.739668] kernel_sendmsg+0x22a/0x2d0 [ 274.743685] sock_no_sendpage+0x1bd/0x250 [ 274.747883] ? sock_no_mmap+0x30/0x30 [ 274.751710] sock_sendpage+0x1ef/0x2e0 [ 274.755656] pipe_to_sendpage+0x31d/0x430 [ 274.759820] ? sock_fasync+0x2b0/0x2b0 [ 274.763747] __splice_from_pipe+0x49f/0xf30 [ 274.768092] ? generic_splice_sendpage+0x2a0/0x2a0 [ 274.773067] generic_splice_sendpage+0x1c2/0x2a0 [ 274.777894] ? iter_file_splice_write+0x1710/0x1710 [ 274.782933] direct_splice_actor+0x19e/0x200 [ 274.787378] splice_direct_to_actor+0x746/0xfb0 [ 274.792069] ? do_splice_direct+0x540/0x540 [ 274.796441] do_splice_direct+0x332/0x540 [ 274.800645] do_sendfile+0x1070/0x1d80 [ 274.804616] __se_sys_sendfile64+0x1c2/0x380 [ 274.809080] __x64_sys_sendfile64+0x56/0x70 [ 274.813449] do_syscall_64+0xb8/0x100 [ 274.817280] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 274.822506] RIP: 0033:0x4572d9 [ 274.825721] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.844647] RSP: 002b:00007f49feb5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 274.852381] RAX: ffffffffffffffda RBX: 00007f49feb5b6d4 RCX: 00000000004572d9 [ 274.859675] RDX: 00000000200037c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 274.866965] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 274.874252] R10: 00000000fffffdef R11: 0000000000000246 R12: 00000000ffffffff [ 274.881532] R13: 00000000004d4ad0 R14: 00000000004c9059 R15: 0000000000000000 [ 274.888837] [ 274.890473] Uninit was created at: [ 274.894037] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 274.899157] kmsan_kmalloc+0x98/0x100 [ 274.902974] __kmalloc+0x13a/0x350 [ 274.906531] tipc_topsrv_queue_evt+0x49f/0x980 [ 274.911152] tipc_sub_timeout+0x28f/0x400 [ 274.915317] call_timer_fn+0x270/0x5b0 [ 274.919216] __run_timers+0xd94/0x11a0 [ 274.923122] run_timer_softirq+0x2e/0x50 [ 274.927204] __do_softirq+0x562/0x948 [ 274.931019] ================================================================== [ 274.938378] Disabling lock debugging due to kernel taint [ 274.943835] Kernel panic - not syncing: panic_on_warn set ... [ 274.943835] [ 274.951234] CPU: 1 PID: 11839 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #48 [ 274.959904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.969266] Call Trace: [ 274.971872] dump_stack+0x14b/0x190 [ 274.975522] panic+0x35d/0x8cb [ 274.978783] kmsan_report+0x2a8/0x2b0 [ 274.982624] __msan_warning+0x70/0xc0 [ 274.986448] __kmalloc_node+0xb2d/0x11c0 [ 274.990525] ? kmsan_set_origin_inline+0x6b/0x120 [ 274.995395] ? __get_vm_area_node+0x27b/0x800 [ 274.999925] __get_vm_area_node+0x27b/0x800 [ 275.004287] __vmalloc_node_range+0x32e/0x1140 [ 275.008907] ? netlink_sendmsg+0xbbd/0x1290 [ 275.013274] vmalloc+0xd8/0xf0 [ 275.016485] ? netlink_sendmsg+0xbbd/0x1290 [ 275.020824] netlink_sendmsg+0xbbd/0x1290 [ 275.025009] ? netlink_getsockopt+0x11c0/0x11c0 [ 275.029698] kernel_sendmsg+0x22a/0x2d0 [ 275.033700] sock_no_sendpage+0x1bd/0x250 [ 275.037888] ? sock_no_mmap+0x30/0x30 [ 275.041702] sock_sendpage+0x1ef/0x2e0 [ 275.045627] pipe_to_sendpage+0x31d/0x430 [ 275.049785] ? sock_fasync+0x2b0/0x2b0 [ 275.053702] __splice_from_pipe+0x49f/0xf30 [ 275.058036] ? generic_splice_sendpage+0x2a0/0x2a0 [ 275.063443] generic_splice_sendpage+0x1c2/0x2a0 [ 275.068241] ? iter_file_splice_write+0x1710/0x1710 [ 275.073273] direct_splice_actor+0x19e/0x200 [ 275.077712] splice_direct_to_actor+0x746/0xfb0 [ 275.082398] ? do_splice_direct+0x540/0x540 [ 275.086759] do_splice_direct+0x332/0x540 [ 275.090947] do_sendfile+0x1070/0x1d80 [ 275.094882] __se_sys_sendfile64+0x1c2/0x380 [ 275.099323] __x64_sys_sendfile64+0x56/0x70 [ 275.103669] do_syscall_64+0xb8/0x100 [ 275.107482] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 275.112683] RIP: 0033:0x4572d9 [ 275.115896] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.134808] RSP: 002b:00007f49feb5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 275.142536] RAX: ffffffffffffffda RBX: 00007f49feb5b6d4 RCX: 00000000004572d9 [ 275.149822] RDX: 00000000200037c0 RSI: 0000000000000004 RDI: 0000000000000003 [ 275.157102] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 275.164384] R10: 00000000fffffdef R11: 0000000000000246 R12: 00000000ffffffff [ 275.171660] R13: 00000000004d4ad0 R14: 00000000004c9059 R15: 0000000000000000 [ 275.179299] Kernel Offset: disabled [ 275.182932] Rebooting in 86400 seconds..