0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:36:58 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:36:58 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:58 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:58 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:36:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:36:59 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:59 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:36:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:59 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:36:59 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:59 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:36:59 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:36:59 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:00 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:00 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:00 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:01 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:01 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:01 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:01 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:01 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:01 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:02 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:02 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:02 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:02 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:02 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:02 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) [ 2043.056715] audit: type=1326 audit(2000000222.446:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31383 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:02 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:02 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:02 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:03 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:03 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:03 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2043.969387] audit: type=1326 audit(2000000223.366:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31403 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:03 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:03 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:03 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:03 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:04 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) 03:37:04 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2044.910651] audit: type=1326 audit(2000000224.306:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31422 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:04 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:04 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:04 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:04 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:05 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:05 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:05 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:05 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:05 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:05 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:06 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:06 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:06 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:06 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:06 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:06 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:07 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:07 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:07 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:07 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:07 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:07 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:07 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) 03:37:08 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:08 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:08 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) 03:37:08 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:08 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:08 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:08 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:09 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:09 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) 03:37:09 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:09 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:09 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:09 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:09 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:09 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:10 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:10 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:10 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:10 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:10 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:10 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:11 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:11 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:11 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:11 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:11 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:11 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:12 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:12 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:12 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:12 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:12 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:12 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:13 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:13 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:13 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:13 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:13 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:13 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:13 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:14 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:14 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:14 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:14 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:14 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:14 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:14 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:15 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:15 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:15 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:15 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:15 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:15 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:16 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:16 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:16 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:16 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:16 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:16 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:17 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:17 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:17 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:17 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:17 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:17 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:18 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:18 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:18 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:18 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:18 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:18 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:18 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:18 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:19 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:19 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:19 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:19 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:19 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:19 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:20 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:20 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:20 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:20 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:20 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:20 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:21 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:21 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:21 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:21 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:21 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:21 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:22 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:22 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:22 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:22 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:22 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:22 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:23 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:23 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:23 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:23 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:23 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:23 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:23 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:24 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:24 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:24 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:24 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:24 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:24 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:24 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:25 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:25 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:25 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:25 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:25 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:25 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:25 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:26 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:26 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:26 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:26 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:26 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:26 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:27 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:27 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:27 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:27 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:27 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:27 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:28 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:28 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:28 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:28 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:28 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:28 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:29 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:29 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:29 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:29 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:29 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:29 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:29 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:30 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:30 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:30 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:30 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:30 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:30 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:30 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:31 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:31 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:31 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:31 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:31 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:31 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:32 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:32 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:32 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:32 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:32 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:32 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:33 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:33 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:33 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:33 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:33 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:33 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:34 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:34 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:34 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:34 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:34 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:34 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:35 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:35 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:35 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:35 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:35 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:35 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:35 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:35 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:36 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:36 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:36 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:36 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:36 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:36 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:36 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:37 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:37 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:37 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:37 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:37 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:37 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:38 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:38 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:38 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:38 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:38 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:38 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:39 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:39 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:39 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:39 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:39 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:39 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:40 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:40 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:40 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:40 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:40 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:40 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:40 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:41 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:41 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:41 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:41 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:41 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:41 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:42 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:42 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:42 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:42 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:42 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:42 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:43 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:43 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:43 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:43 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:43 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:43 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:43 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:43 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:43 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:44 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:44 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:44 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:44 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:44 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:44 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:45 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:45 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:45 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:45 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:45 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:45 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:45 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:45 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:46 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:46 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:46 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:46 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:46 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:46 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:46 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:47 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:47 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:47 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:47 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:47 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:47 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:48 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:48 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:48 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:48 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:49 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:49 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:49 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:49 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:49 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:49 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2090.134209] audit: type=1326 audit(2000000269.526:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32382 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:49 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:49 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:49 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:49 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:50 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2091.006702] audit: type=1326 audit(2000000270.396:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32401 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:50 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:50 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:50 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:50 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:50 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:50 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:50 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:50 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 5: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2091.908755] audit: type=1326 audit(2000000271.306:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32438 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2092.270460] audit: type=1326 audit(2000000271.666:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32451 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:51 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:51 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:51 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:52 executing program 5: clock_gettime(0x0, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000580)={@local}, 0x14) syz_open_pts(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) 03:37:52 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:52 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2093.158744] audit: type=1326 audit(2000000272.556:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32471 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:52 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:52 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:52 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:53 executing program 5: 03:37:53 executing program 5: 03:37:53 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:53 executing program 5: 03:37:53 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:53 executing program 5: 03:37:53 executing program 5: [ 2094.059867] audit: type=1326 audit(2000000273.456:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32496 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:53 executing program 5: 03:37:53 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:53 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:53 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:53 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:54 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:54 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000000180)='IPVS\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=""/94, 0x5e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) geteuid() getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000001700)) gettid() lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000003c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002d40)) 03:37:54 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:54 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:54 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:54 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:55 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:55 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0610fef69dc0fc201e5eefeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe66400f147a09e87f") setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000003b80)=ANY=[], 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000440)=0xc) getegid() setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) arch_prctl(0x0, &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getgid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:55 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:55 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:55 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0610fef69dc0fc201e5eefeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe66400f147a09e87f") setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000003b80)=ANY=[], 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000440)=0xc) getegid() setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) arch_prctl(0x0, &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getgid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:55 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:55 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:55 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0610fef69dc0fc201e5eefeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe66400f147a09e87f") setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000003b80)=ANY=[], 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000440)=0xc) getegid() setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) arch_prctl(0x0, &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getgid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:55 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0610fef69dc0fc201e5eefeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe66400f147a09e87f") setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000003b80)=ANY=[], 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000440)=0xc) getegid() setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) arch_prctl(0x0, &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getgid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:55 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000610000007bcd1b7ace65523f39e7775595ea18a6ac4b2795a6de599bd27a9a4e19755073243700040000dbfbd04327fb5c65fce6d8ceb2640b7fbc3a73b2727eb69cb5eeb8dfba2ecbec00dd865c18fb010548eb04bdd8f82b407f971466adc444a13be329b409ef6d"], &(0x7f0000000040)=0x1) 03:37:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001840)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$UI_ABS_SETUP(r0, 0xc00c55ca, &(0x7f00000000c0)={0x7ff, {0x0, 0x0, 0x0, 0x0, 0x9}}) 03:37:56 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:56 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:56 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:56 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:56 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:56 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:57 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:57 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(r0, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:57 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:57 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:57 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:57 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:57 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:57 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:57 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:57 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:57 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:58 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:58 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:58 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:58 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:58 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:58 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:58 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:58 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:59 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:37:59 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 2099.870379] audit: type=1326 audit(2000000279.256:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32687 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:59 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:59 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:59 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:37:59 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:59 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:38:00 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:00 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2100.822162] audit: type=1326 audit(2000000280.216:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32731 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:00 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:00 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:01 executing program 4: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) 03:38:01 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:01 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:01 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2101.758347] audit: type=1326 audit(2000000281.156:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32761 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2101.833904] audit: type=1326 audit(2000000281.226:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=32767 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:01 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2102.149662] audit: type=1326 audit(2000000281.546:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2102.363642] audit: type=1326 audit(2000000281.756:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=317 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:01 executing program 0: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:02 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 2102.565888] audit: type=1326 audit(2000000281.956:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 2102.645034] audit: type=1326 audit(2000000282.036:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=324 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:02 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:02 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:02 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:02 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:02 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:02 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:03 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:03 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2103.613278] audit: type=1326 audit(2000000283.006:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:38:03 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:03 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:03 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:03 executing program 3 (fault-call:0 fault-nth:0): keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:03 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:04 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:04 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:04 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:04 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:04 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:04 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:04 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:05 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:05 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:05 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:05 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:05 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:05 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:05 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:38:05 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:05 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:05 executing program 3: keyctl$set_reqkey_keyring(0x4, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:05 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:05 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:05 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:05 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:05 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:06 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:06 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:06 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:06 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:06 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:06 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:07 executing program 3: keyctl$set_reqkey_keyring(0xb, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:07 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:07 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:07 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:07 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:07 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:07 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:07 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:08 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:08 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:08 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:08 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:08 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:08 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:08 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:09 executing program 3: keyctl$set_reqkey_keyring(0xd, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:09 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:09 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:09 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:09 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:09 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:10 executing program 3: keyctl$set_reqkey_keyring(0x3, 0x5) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000140)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xf, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000640)={0x0, 0xffffffffffffff9c}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:38:10 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:10 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:10 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:10 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:10 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2111.397557] INFO: task syz-executor0:28626 blocked for more than 140 seconds. [ 2111.405542] Not tainted 4.19.0-rc3-next-20180913+ #73 [ 2111.431838] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2111.462798] syz-executor0 D25208 28626 5562 0x00000000 [ 2111.485202] Call Trace: [ 2111.494668] __schedule+0x86c/0x1ed0 [ 2111.510803] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2111.530540] ? __sched_text_start+0x8/0x8 [ 2111.548113] ? preempt_schedule+0x4d/0x60 [ 2111.566837] ? ___preempt_schedule+0x16/0x18 [ 2111.584726] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 2111.606664] ? print_usage_bug+0xc0/0xc0 [ 2111.624342] ? try_to_wake_up+0x10a/0x12f0 [ 2111.642821] ? migrate_swap_stop+0x930/0x930 [ 2111.661234] ? graph_lock+0x170/0x170 [ 2111.677985] schedule+0xfe/0x460 [ 2111.689993] ? __schedule+0x1ed0/0x1ed0 [ 2111.704539] ? lock_downgrade+0x900/0x900 [ 2111.719134] ? find_held_lock+0x36/0x1c0 [ 2111.734634] ? mark_held_locks+0xc7/0x130 [ 2111.750616] schedule_timeout+0x1cc/0x260 [ 2111.764713] ? usleep_range+0x1a0/0x1a0 [ 2111.778911] ? __ldsem_down_read_nested+0x4e3/0xb80 [ 2111.796783] ? trace_hardirqs_off_caller+0x300/0x300 [ 2111.814830] ? kasan_check_write+0x14/0x20 [ 2111.825984] ? do_raw_spin_lock+0xc1/0x200 [ 2111.836981] __ldsem_down_read_nested+0x538/0xb80 [ 2111.858501] ? ldsem_wake+0x40/0x40 [ 2111.870224] ? find_held_lock+0x36/0x1c0 [ 2111.886603] ldsem_down_read+0x32/0x40 [ 2111.900766] ? ldsem_down_read+0x32/0x40 [ 2111.917007] tty_ldisc_ref_wait+0x25/0x80 [ 2111.931022] tty_ioctl+0x512/0x1820 [ 2111.945186] ? tty_vhangup+0x30/0x30 [ 2111.959292] ? rcu_softirq_qs+0x20/0x20 03:38:11 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 2111.974810] ? __fget+0x4d1/0x740 [ 2111.987768] ? ksys_dup3+0x680/0x680 [ 2112.002556] ? tty_vhangup+0x30/0x30 [ 2112.016821] do_vfs_ioctl+0x1de/0x1720 [ 2112.047317] ? ioctl_preallocate+0x300/0x300 03:38:11 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2112.068106] ? __fget_light+0x2e9/0x430 [ 2112.087954] ? fget_raw+0x20/0x20 [ 2112.103157] ? graph_lock+0x170/0x170 [ 2112.121540] ? __x64_sys_futex+0x47f/0x6a0 [ 2112.139370] ? do_syscall_64+0x9a/0x820 [ 2112.151095] ? do_syscall_64+0x9a/0x820 [ 2112.155097] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2112.178184] ? security_file_ioctl+0x94/0xc0 [ 2112.182623] ksys_ioctl+0xa9/0xd0 [ 2112.186086] __x64_sys_ioctl+0x73/0xb0 [ 2112.220421] do_syscall_64+0x1b9/0x820 [ 2112.224358] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2112.237074] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2112.251025] ? trace_hardirqs_off+0x310/0x310 [ 2112.263430] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:38:11 executing program 0: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:11 executing program 4: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000300)=0x6e) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2112.278674] ? recalc_sigpending_tsk+0x180/0x180 [ 2112.292416] ? kasan_check_write+0x14/0x20 [ 2112.305698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2112.327683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2112.354394] RIP: 0033:0x4572d9 [ 2112.369095] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2112.449454] RSP: 002b:00007fbf4ee8bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.475363] RAX: ffffffffffffffda RBX: 00007fbf4ee8c6d4 RCX: 00000000004572d9 [ 2112.499960] RDX: 0000000020000140 RSI: 0000000000004b62 RDI: 0000000000000005 [ 2112.524654] RBP: 0000000000930320 R08: 0000000000000000 R09: 0000000000000000 [ 2112.551586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2112.575871] R13: 00000000004cf3b8 R14: 00000000004c56c1 R15: 0000000000000004 [ 2112.600227] [ 2112.600227] Showing all locks held in the system: [ 2112.622570] 1 lock held by khungtaskd/984: [ 2112.637001] #0: 00000000d7e7f5a7 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 2112.672532] 1 lock held by rsyslogd/5426: [ 2112.686902] #0: 00000000ca30f814 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 2112.713633] 2 locks held by getty/5516: [ 2112.728109] #0: 00000000c20e41d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2112.755594] #1: 00000000d773fe34 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2112.786104] 2 locks held by getty/5517: [ 2112.799218] #0: 00000000928897fb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2112.817708] #1: 00000000c99c188b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2112.838076] 2 locks held by getty/5518: [ 2112.847922] #0: 000000008646cabd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2112.866674] #1: 00000000c84d5cef (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2112.887205] 2 locks held by getty/5519: 03:38:12 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000140), &(0x7f0000002380), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 2112.896936] #0: 000000006aa2eff8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2112.947118] #1: 000000000b2d0977 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2112.982384] 2 locks held by getty/5520: [ 2112.999682] #0: 00000000cdae8a9d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 03:38:12 executing program 2: rmdir(&(0x7f0000000780)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000080)=0xffffffffffffff93) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000700), 0x14) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') keyctl$negate(0xd, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sched_yield() openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2113.032872] #1: 000000004b86edfc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.059770] 2 locks held by getty/5521: [ 2113.074098] #0: 00000000cc45d305 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.109694] #1: 0000000050cb8a18 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.144601] 2 locks held by getty/5522: [ 2113.160464] #0: 0000000017a31cd1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.190689] #1: 0000000088ac65e9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.210837] 2 locks held by udevd/5524: [ 2113.220890] #0: 0000000000e0b8f6 (&rq->lock){-.-.}, at: __schedule+0x236/0x1ed0 [ 2113.242845] #1: 00000000d7e7f5a7 (rcu_read_lock){....}, at: update_curr+0x383/0xbe0 [ 2113.262559] 2 locks held by syz-executor3/10139: [ 2113.271455] #0: 00000000d4ca0842 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.279957] #1: 0000000033f393b1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.289064] 2 locks held by syz-executor2/25282: [ 2113.293978] #0: 00000000aee04d33 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.307174] #1: 000000002be68e49 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.323688] 2 locks held by syz-executor0/28593: [ 2113.332116] #0: 00000000d75288a1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.346115] #1: 000000000dec32a1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2113.363109] 1 lock held by syz-executor0/28625: [ 2113.372383] #0: 000000008fa1a1e7 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 2113.389722] 1 lock held by syz-executor0/28626: [ 2113.400233] #0: 00000000d75288a1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2113.416628] 1 lock held by syz-executor5/531: [ 2113.425875] #0: 00000000efa11c17 (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x8b/0x250 [ 2113.445558] [ 2113.451362] ============================================= [ 2113.451362] [ 2113.466564] NMI backtrace for cpu 1 [ 2113.470438] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3-next-20180913+ #73 [ 2113.478500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.487848] Call Trace: [ 2113.490443] dump_stack+0x1d3/0x2c4 [ 2113.494075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2113.499280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.504839] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 2113.510033] nmi_cpu_backtrace.cold.4+0x63/0xa2 [ 2113.514706] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 2113.519908] nmi_trigger_cpumask_backtrace+0x1c2/0x22c [ 2113.525189] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2113.530387] watchdog+0xb39/0x1050 [ 2113.533941] ? reset_hung_task_detector+0xd0/0xd0 [ 2113.538810] ? __kthread_parkme+0xce/0x1a0 [ 2113.543052] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2113.548159] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2113.553272] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2113.557864] ? trace_hardirqs_on+0xbd/0x310 [ 2113.562185] ? kasan_check_read+0x11/0x20 [ 2113.566336] ? __kthread_parkme+0xce/0x1a0 [ 2113.570577] ? trace_hardirqs_off_caller+0x300/0x300 [ 2113.575686] ? kasan_check_write+0x14/0x20 [ 2113.579927] ? do_raw_spin_lock+0xc1/0x200 [ 2113.584168] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2113.589278] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2113.594827] ? __kthread_parkme+0xfb/0x1a0 [ 2113.599066] ? reset_hung_task_detector+0xd0/0xd0 [ 2113.603907] kthread+0x35a/0x440 [ 2113.607281] ? kthread_bind+0x40/0x40 [ 2113.611091] ret_from_fork+0x3a/0x50 [ 2113.614906] Sending NMI from CPU 1 to CPUs 0: [ 2113.620422] NMI backtrace for cpu 0 [ 2113.620430] CPU: 0 PID: 5563 Comm: syz-executor5 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 2113.620438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.620443] RIP: 0010:rcu_read_lock_sched_held+0x27/0x120 [ 2113.620455] Code: 00 00 00 48 c7 c7 54 8a 51 8a 55 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 89 e5 53 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 <83> c0 03 38 d0 7c 08 84 d2 0f 85 aa 00 00 00 8b 0d 88 d5 ea 08 85 [ 2113.620460] RSP: 0018:ffff880140ad7478 EFLAGS: 00000002 [ 2113.620470] RAX: 0000000000000004 RBX: ffff8801dac2da00 RCX: 0000000000000000 [ 2113.620476] RDX: 0000000000000000 RSI: ffffffff83904c38 RDI: ffffffff8a518a54 [ 2113.620482] RBP: ffff880140ad7480 R08: ffff880140aca0c0 R09: 0000000000000000 [ 2113.620488] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880140ad7808 [ 2113.620494] R13: 1ffff1002815aec9 R14: 0000000000000000 R15: ffff880140aca0c0 [ 2113.620500] FS: 0000000001bb7940(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 2113.620505] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2113.620511] CR2: 0000000001713e80 CR3: 0000000140a73000 CR4: 00000000001406f0 [ 2113.620515] Call Trace: [ 2113.620519] rcu_note_context_switch+0x12ad/0x2150 [ 2113.620524] ? mark_held_locks+0x130/0x130 [ 2113.620528] ? __rcu_read_unlock+0x2e0/0x2e0 [ 2113.620533] ? mark_held_locks+0x130/0x130 [ 2113.620537] ? find_held_lock+0x36/0x1c0 [ 2113.620541] ? graph_lock+0x170/0x170 [ 2113.620545] ? mark_held_locks+0x130/0x130 [ 2113.620549] ? __lock_acquire+0x7ec/0x4ec0 [ 2113.620554] ? debug_object_activate+0x402/0x600 [ 2113.620558] ? lock_downgrade+0x900/0x900 [ 2113.620563] ? trace_hardirqs_off+0xb8/0x310 [ 2113.620567] ? kasan_check_read+0x11/0x20 [ 2113.620571] ? trace_hardirqs_off+0xb8/0x310 [ 2113.620575] ? schedule+0xfe/0x460 [ 2113.620580] ? trace_hardirqs_on_caller+0x310/0x310 [ 2113.620584] __schedule+0x22e/0x1ed0 [ 2113.620588] ? find_held_lock+0x36/0x1c0 [ 2113.620593] ? __sched_text_start+0x8/0x8 [ 2113.620598] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2113.620602] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2113.620607] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2113.620611] ? trace_hardirqs_on+0xbd/0x310 [ 2113.620615] ? kasan_check_read+0x11/0x20 [ 2113.620620] ? hrtimer_start_range_ns+0x6c4/0xdf0 [ 2113.620625] ? trace_hardirqs_off_caller+0x300/0x300 [ 2113.620630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.620635] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2113.620639] ? hrtimer_start_range_ns+0x6c4/0xdf0 [ 2113.620643] schedule+0xfe/0x460 [ 2113.620647] ? __schedule+0x1ed0/0x1ed0 [ 2113.620652] ? debug_object_free+0x690/0x690 [ 2113.620656] ? kasan_check_write+0x14/0x20 [ 2113.620660] ? find_held_lock+0x36/0x1c0 [ 2113.620664] do_nanosleep+0x21e/0x750 [ 2113.620668] ? lock_downgrade+0x900/0x900 [ 2113.620673] ? schedule_timeout_idle+0x90/0x90 [ 2113.620677] ? lock_release+0x970/0x970 [ 2113.620681] ? ttwu_stat+0x5c0/0x5c0 [ 2113.620685] ? kernel_wait4+0x2e0/0x3f0 [ 2113.620689] ? memset+0x31/0x40 [ 2113.620694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.620698] ? __hrtimer_init+0xdb/0x240 [ 2113.620703] hrtimer_nanosleep+0x2d4/0x620 [ 2113.620707] ? nanosleep_copyout+0x130/0x130 [ 2113.620712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2113.620716] ? clock_was_set_work+0x30/0x30 [ 2113.620721] ? do_syscall_64+0x9a/0x820 [ 2113.620725] ? do_syscall_64+0x9a/0x820 [ 2113.620729] __x64_sys_nanosleep+0x1e7/0x280 [ 2113.620734] ? hrtimer_nanosleep+0x620/0x620 [ 2113.620738] do_syscall_64+0x1b9/0x820 [ 2113.620743] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2113.620748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2113.620753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2113.620757] ? trace_hardirqs_off+0x310/0x310 [ 2113.620762] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2113.620767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2113.620772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.620775] RIP: 0033:0x482d90 [ 2113.620788] Code: 00 00 48 c7 c0 d4 ff ff ff 64 c7 00 16 00 00 00 31 c0 eb be 66 0f 1f 44 00 00 83 3d c1 36 5c 00 00 75 14 b8 23 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 14 fa f8 ff c3 48 83 ec 08 e8 ba 70 fd ff [ 2113.620792] RSP: 002b:00007fffec7e5138 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 2113.620802] RAX: ffffffffffffffda RBX: 00000000002037a0 RCX: 0000000000482d90 [ 2113.620807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fffec7e5140 [ 2113.620813] RBP: 0000000000001c8d R08: 0000000000000001 R09: 0000000001bb7940 [ 2113.620819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 2113.620825] R13: 000000000020375e R14: 0000000000000b04 R15: badc0ffeebadface [ 2113.658743] Kernel panic - not syncing: hung_task: blocked tasks [ 2113.677398] kobject: 'loop5' (00000000fc9de234): kobject_uevent_env [ 2113.679288] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3-next-20180913+ #73 [ 2113.679297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.679303] Call Trace: [ 2113.679321] dump_stack+0x1d3/0x2c4 [ 2113.679336] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2113.679375] panic+0x238/0x4e7 [ 2113.679388] ? add_taint.cold.5+0x16/0x16 [ 2113.679408] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 2113.686780] kobject: 'loop5' (00000000fc9de234): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2113.694053] ? nmi_trigger_cpumask_backtrace+0x1fe/0x22c [ 2113.694067] ? nmi_trigger_cpumask_backtrace+0x1ab/0x22c [ 2113.694082] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 2113.694104] watchdog+0xb4a/0x1050 [ 2113.694132] ? reset_hung_task_detector+0xd0/0xd0 [ 2114.143053] ? __kthread_parkme+0xce/0x1a0 [ 2114.147302] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2114.152409] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2114.157524] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2114.162110] ? trace_hardirqs_on+0xbd/0x310 [ 2114.166436] ? kasan_check_read+0x11/0x20 [ 2114.170588] ? __kthread_parkme+0xce/0x1a0 [ 2114.174835] ? trace_hardirqs_off_caller+0x300/0x300 [ 2114.179948] ? kasan_check_write+0x14/0x20 [ 2114.184187] ? do_raw_spin_lock+0xc1/0x200 [ 2114.188431] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2114.193543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2114.199083] ? __kthread_parkme+0xfb/0x1a0 [ 2114.203324] ? reset_hung_task_detector+0xd0/0xd0 [ 2114.208183] kthread+0x35a/0x440 [ 2114.211550] ? kthread_bind+0x40/0x40 [ 2114.215354] ret_from_fork+0x3a/0x50 [ 2114.220284] Kernel Offset: disabled [ 2114.223919] Rebooting in 86400 seconds..