}, &(0x7f00000010c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001240)={'bcsf0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@dev, @in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001600)={'veth1_to_bond\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001880)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001d80)={@multicast2, @broadcast}, &(0x7f0000001dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000020c0)={@loopback, @dev}, &(0x7f0000002100)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002140)={@ipv4={[], [], @remote}}, &(0x7f0000002180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000000080), 0xc, &(0x7f0000002f40)={&(0x7f00000021c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:11:14 executing program 1: timerfd_create(0x7, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @dev}, &(0x7f0000000280)=0xc) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 11:11:14 executing program 3: rmdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000480)={@ipv4={[], [], @local}}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000640)={@multicast1, @remote}, &(0x7f0000000680)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@multicast1, @dev}, &(0x7f00000008c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@multicast2, @remote}, &(0x7f0000000940)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @multicast2}, &(0x7f0000000c00)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@multicast2}, &(0x7f0000000d00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@loopback, @remote}, &(0x7f0000000dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000010c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001240)={'bcsf0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@dev, @in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001600)={'veth1_to_bond\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001880)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001d80)={@multicast2, @broadcast}, &(0x7f0000001dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000020c0)={@loopback, @dev}, &(0x7f0000002100)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002140)={@ipv4={[], [], @remote}}, &(0x7f0000002180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000000080), 0xc, &(0x7f0000002f40)={&(0x7f00000021c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:11:14 executing program 3: rmdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000480)={@ipv4={[], [], @local}}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000640)={@multicast1, @remote}, &(0x7f0000000680)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@multicast1, @dev}, &(0x7f00000008c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@multicast2, @remote}, &(0x7f0000000940)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @multicast2}, &(0x7f0000000c00)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@multicast2}, &(0x7f0000000d00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@loopback, @remote}, &(0x7f0000000dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000010c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001240)={'bcsf0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@dev, @in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001600)={'veth1_to_bond\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001880)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001d80)={@multicast2, @broadcast}, &(0x7f0000001dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000020c0)={@loopback, @dev}, &(0x7f0000002100)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002140)={@ipv4={[], [], @remote}}, &(0x7f0000002180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000000080), 0xc, &(0x7f0000002f40)={&(0x7f00000021c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:11:16 executing program 3: rmdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000480)={@ipv4={[], [], @local}}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000640)={@multicast1, @remote}, &(0x7f0000000680)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@multicast1, @dev}, &(0x7f00000008c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@multicast2, @remote}, &(0x7f0000000940)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @multicast2}, &(0x7f0000000c00)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@multicast2}, &(0x7f0000000d00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@loopback, @remote}, &(0x7f0000000dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000010c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001240)={'bcsf0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@dev, @in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001600)={'veth1_to_bond\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001880)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001d80)={@multicast2, @broadcast}, &(0x7f0000001dc0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000020c0)={@loopback, @dev}, &(0x7f0000002100)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002140)={@ipv4={[], [], @remote}}, &(0x7f0000002180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000000080), 0xc, &(0x7f0000002f40)={&(0x7f00000021c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:11:16 executing program 5: ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/user\x00') ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000640)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast2}, 'eql\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9c921b1aee1ff3939228e0f38211a64a701dfe0400f01efddcf417545c4a1f9d604411a1ac422fd3374b8fe6464660fec3b90c560440fc737f70f2b05090000003f") socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) syz_open_pts(0xffffffffffffffff, 0x0) eventfd(0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000400)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0xffffffffffffffda) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000280), 0xc, &(0x7f0000000800)={&(0x7f0000000a00)=ANY=[]}}, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000180)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) pipe(&(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300), 0xc, &(0x7f0000000740)={&(0x7f00000005c0)=ANY=[]}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000006c0)) syz_open_procfs(0x0, &(0x7f0000000700)='sessionid\x00') getgroups(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 11:11:16 executing program 4: getitimer(0x1, &(0x7f00000002c0)) ustat(0x0, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xff88) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@dev}, &(0x7f0000000b80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c00)={@multicast1}, &(0x7f0000000c40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f00000070c0), 0x0, 0x0, &(0x7f0000001e40)={0x77359400}) getsockname(0xffffffffffffffff, &(0x7f0000007240)=@can, &(0x7f00000072c0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007300)={'lo\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007340)={{{@in, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000007440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007500)={0x0, @multicast2, @rand_addr}, &(0x7f0000007540)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007580)={@rand_addr, @broadcast}, &(0x7f00000075c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007600)={@rand_addr, @broadcast}, &(0x7f0000007640)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007680)={{{@in6=@local, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000007780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000077c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007800)=0x14) clock_gettime(0x0, &(0x7f000000b400)) recvmmsg(0xffffffffffffffff, &(0x7f000000b300), 0x0, 0x0, &(0x7f000000b440)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000b480)={@loopback}, &(0x7f000000b4c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b5c0)={{{@in=@local, @in=@rand_addr}}, {{@in6=@mcast1}}}, &(0x7f000000b6c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b900)={{{@in=@loopback, @in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f000000ba00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000bb00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in6=@loopback, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000bc80)=0xe8) clock_gettime(0x0, &(0x7f000000cfc0)) recvmmsg(0xffffffffffffffff, &(0x7f000000ce80), 0x0, 0x0, &(0x7f000000d000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000d040)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000d8c0)={&(0x7f0000000740), 0xc, &(0x7f000000d880)={&(0x7f000000eb80)=ANY=[]}}, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @multicast1}, &(0x7f0000000940)=0x354) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000680)={@mcast1}) io_setup(0x0, &(0x7f00000007c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000400)) capget(&(0x7f00000004c0), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000080)) get_robust_list(0x0, &(0x7f00000006c0)=&(0x7f0000000600)={&(0x7f0000000440)}, &(0x7f0000000700)=0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000780)={0x0, &(0x7f0000000740)}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000480)='dns_resolver\x00', &(0x7f0000000540), &(0x7f0000000700), 0x0, 0xffffffffffffffff) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800), &(0x7f0000000840)=0x4) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0), &(0x7f0000000600), 0x0, 0xfffffffffffffff8) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 11:11:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0x4) 11:11:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0x4) 11:11:21 executing program 0: getpid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000380)) socket$inet_tcp(0x2, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000640)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000600)) socket$packet(0x11, 0x0, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth0_to_team\x00') getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/46, &(0x7f0000000340)=0x2e) add_key(&(0x7f0000000440)='logon\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 11:11:21 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 11:11:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0x4) 11:11:21 executing program 4: dup(0xffffffffffffff9c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000001480), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f00000014c0)='rxrpc\x00', &(0x7f0000001500), &(0x7f0000001540), 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x1000000a6, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)=""/4096, &(0x7f00000015c0)=0x1000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x389, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002680)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe29a9f567f") 11:11:21 executing program 1: timerfd_create(0x7, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @dev}, &(0x7f0000000280)=0xc) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 11:11:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), 0x4) 11:11:21 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:22 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 11:11:22 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:22 executing program 4: dup(0xffffffffffffff9c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000001480), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f00000014c0)='rxrpc\x00', &(0x7f0000001500), &(0x7f0000001540), 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x1000000a6, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)=""/4096, &(0x7f00000015c0)=0x1000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x389, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002680)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe29a9f567f") 11:11:22 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:23 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 11:11:25 executing program 1: timerfd_create(0x7, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @dev}, &(0x7f0000000280)=0xc) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 11:11:25 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:25 executing program 4: dup(0xffffffffffffff9c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000001480), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f00000014c0)='rxrpc\x00', &(0x7f0000001500), &(0x7f0000001540), 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x1000000a6, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)=""/4096, &(0x7f00000015c0)=0x1000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x389, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002680)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe29a9f567f") 11:11:25 executing program 3: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 11:11:25 executing program 0: futex(&(0x7f0000000800), 0x0, 0x0, &(0x7f00000007c0)={0x0, 0x989680}, &(0x7f0000000180), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) memfd_create(&(0x7f00000001c0)='/dev/uhid\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 11:11:26 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:26 executing program 3: getgroups(0x318, &(0x7f0000000180)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x189, &(0x7f0000000300)}) utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0cac4c1f9f7cce3fe610bcbff9191a33d062900f2450f5845126b2179660f38342fcbe59e75450f2e1ac4010d64ac1e5d31a3b7e29873bbf20f5e12") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) lstat(&(0x7f0000000b80)='./file2\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in, @in=@broadcast}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000003c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001240)) getresgid(&(0x7f0000000240), &(0x7f0000001300), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)) getuid() syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000400)=""/246) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000280)) getpid() geteuid() getpgid(0x0) lstat(&(0x7f0000001fc0)='./file1\x00', &(0x7f0000002000)) 11:11:26 executing program 4: dup(0xffffffffffffff9c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000001480), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f00000014c0)='rxrpc\x00', &(0x7f0000001500), &(0x7f0000001540), 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x1000000a6, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)=""/4096, &(0x7f00000015c0)=0x1000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x389, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002680)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe29a9f567f") 11:11:29 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:29 executing program 4: gettid() getpgid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) inotify_init1(0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) rt_sigpending(&(0x7f00000006c0), 0x8) set_thread_area(&(0x7f00000005c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000240)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003380)={{{@in=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004740), &(0x7f0000004780)=0xc) fstat(0xffffffffffffffff, &(0x7f00000047c0)) fstat(0xffffffffffffffff, &(0x7f0000004840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004a80)=0xe8) getgid() lstat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) stat(&(0x7f0000004b80)='\x00', &(0x7f0000004bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000004d40)=0xe8) getresgid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getresuid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) lstat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000050c0)=0xe8) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000004700), 0x0, &(0x7f0000005100)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @remote}, &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 11:11:29 executing program 3: getgroups(0x318, &(0x7f0000000180)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x189, &(0x7f0000000300)}) utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0cac4c1f9f7cce3fe610bcbff9191a33d062900f2450f5845126b2179660f38342fcbe59e75450f2e1ac4010d64ac1e5d31a3b7e29873bbf20f5e12") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) lstat(&(0x7f0000000b80)='./file2\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in, @in=@broadcast}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000003c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001240)) getresgid(&(0x7f0000000240), &(0x7f0000001300), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)) getuid() syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000400)=""/246) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000280)) getpid() geteuid() getpgid(0x0) lstat(&(0x7f0000001fc0)='./file1\x00', &(0x7f0000002000)) 11:11:29 executing program 2: getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote}, &(0x7f0000000280)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 11:11:32 executing program 1: timerfd_create(0x7, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @dev}, &(0x7f0000000280)=0xc) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 11:11:32 executing program 3: getgroups(0x318, &(0x7f0000000180)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x189, &(0x7f0000000300)}) utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0cac4c1f9f7cce3fe610bcbff9191a33d062900f2450f5845126b2179660f38342fcbe59e75450f2e1ac4010d64ac1e5d31a3b7e29873bbf20f5e12") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) lstat(&(0x7f0000000b80)='./file2\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in, @in=@broadcast}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000003c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001240)) getresgid(&(0x7f0000000240), &(0x7f0000001300), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)) getuid() syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000400)=""/246) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000280)) getpid() geteuid() getpgid(0x0) lstat(&(0x7f0000001fc0)='./file1\x00', &(0x7f0000002000)) 11:11:32 executing program 2: getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote}, &(0x7f0000000280)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 11:11:32 executing program 4: gettid() getpgid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) inotify_init1(0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) rt_sigpending(&(0x7f00000006c0), 0x8) set_thread_area(&(0x7f00000005c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000240)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003380)={{{@in=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004740), &(0x7f0000004780)=0xc) fstat(0xffffffffffffffff, &(0x7f00000047c0)) fstat(0xffffffffffffffff, &(0x7f0000004840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004a80)=0xe8) getgid() lstat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) stat(&(0x7f0000004b80)='\x00', &(0x7f0000004bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000004d40)=0xe8) getresgid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getresuid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) lstat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000050c0)=0xe8) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000004700), 0x0, &(0x7f0000005100)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @remote}, &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 11:11:34 executing program 0: clock_getres(0xfffffffffefffffe, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000340)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$rtc(&(0x7f00000002c0)='/dev/rtc#\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) accept(0xffffffffffffffff, &(0x7f0000000400)=@sco, &(0x7f0000000480)=0x80) ppoll(&(0x7f0000000600), 0x0, &(0x7f0000000640)={0x77359400}, &(0x7f0000000680), 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000004c0)={0x0, 'veth0_to_team\x00'}, 0x18) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/24) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$getreaper(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000003c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) time(&(0x7f0000000280)) write$input_event(0xffffffffffffffff, &(0x7f0000000140), 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000040)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14) 11:11:34 executing program 2: getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote}, &(0x7f0000000280)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 11:11:34 executing program 3: getgroups(0x318, &(0x7f0000000180)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x189, &(0x7f0000000300)}) utime(&(0x7f0000000140)='./file1\x00', &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0cac4c1f9f7cce3fe610bcbff9191a33d062900f2450f5845126b2179660f38342fcbe59e75450f2e1ac4010d64ac1e5d31a3b7e29873bbf20f5e12") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) lstat(&(0x7f0000000b80)='./file2\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in, @in=@broadcast}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000003c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001240)) getresgid(&(0x7f0000000240), &(0x7f0000001300), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)) getuid() syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000400)=""/246) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000280)) getpid() geteuid() getpgid(0x0) lstat(&(0x7f0000001fc0)='./file1\x00', &(0x7f0000002000)) 11:11:34 executing program 4: gettid() getpgid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) inotify_init1(0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) rt_sigpending(&(0x7f00000006c0), 0x8) set_thread_area(&(0x7f00000005c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000240)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003380)={{{@in=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004740), &(0x7f0000004780)=0xc) fstat(0xffffffffffffffff, &(0x7f00000047c0)) fstat(0xffffffffffffffff, &(0x7f0000004840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004a80)=0xe8) getgid() lstat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) stat(&(0x7f0000004b80)='\x00', &(0x7f0000004bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000004d40)=0xe8) getresgid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getresuid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) lstat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000050c0)=0xe8) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000004700), 0x0, &(0x7f0000005100)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @remote}, &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 11:11:37 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:37 executing program 3: getegid() inotify_init1(0x0) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:11:37 executing program 2: getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote}, &(0x7f0000000280)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 11:11:37 executing program 4: gettid() getpgid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) inotify_init1(0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) rt_sigpending(&(0x7f00000006c0), 0x8) set_thread_area(&(0x7f00000005c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000240)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003380)={{{@in=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004740), &(0x7f0000004780)=0xc) fstat(0xffffffffffffffff, &(0x7f00000047c0)) fstat(0xffffffffffffffff, &(0x7f0000004840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000004a80)=0xe8) getgid() lstat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) stat(&(0x7f0000004b80)='\x00', &(0x7f0000004bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000004d40)=0xe8) getresgid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getresuid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) lstat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000050c0)=0xe8) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000004700), 0x0, &(0x7f0000005100)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @remote}, &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 11:11:38 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0x1) getpid() 11:11:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/120, 0x78}, {&(0x7f0000000f80)=""/253, 0xfd}], 0x3}}], 0x1, 0x0, &(0x7f00000046c0)) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x0) 11:11:38 executing program 3: getegid() inotify_init1(0x0) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:11:38 executing program 1: clock_getres(0x8000000, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), 0xc) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}, 0x10) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480), 0xc) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:11:39 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x6) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000300)=0x8cfacae6c7830ed0) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/96, 0x60, 0x0, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000540), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000001040)) timer_settime(0x0, 0x0, &(0x7f0000000ac0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000b00)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/context\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) delete_module(&(0x7f0000000d80)='trusted.overlay.opaque\x00', 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000a00)) syz_execute_func(&(0x7f0000000800)="428055a063794cef301cc96b00d9dc00d95d2f8a20f2420f58410d397c2a0f0fcdae300f38212ef30f2d39c07f41df7ec326e026e001efc4a1d0567a24f00fba320aecc461cfd0cb1a1a01460f9c9cee45dfde9f") 11:11:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/120, 0x78}, {&(0x7f0000000f80)=""/253, 0xfd}], 0x3}}], 0x1, 0x0, &(0x7f00000046c0)) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x0) 11:11:39 executing program 3: getegid() inotify_init1(0x0) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:11:39 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0x1) getpid() 11:11:45 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:11:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/120, 0x78}, {&(0x7f0000000f80)=""/253, 0xfd}], 0x3}}], 0x1, 0x0, &(0x7f00000046c0)) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x0) 11:11:45 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0x1) getpid() 11:11:45 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0xfffffffffffffdb7, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00@\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0xffffffffffffff7a) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f0000001500)=0x4) geteuid() getresuid(&(0x7f0000000380), &(0x7f0000002880), &(0x7f00000028c0)) clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001580)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000015c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000016c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001700)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@multicast2, @local}, &(0x7f0000001940)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001980)={@remote, @loopback}, &(0x7f00000019c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team_slave_0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001c00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002200)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002240)={@multicast1, @loopback}, &(0x7f0000002280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000022c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002340)=0x14) accept(0xffffffffffffffff, &(0x7f0000002380)=@xdp, &(0x7f0000002400)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000002440), &(0x7f0000002480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000025c0)=0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 11:11:45 executing program 3: getegid() inotify_init1(0x0) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:11:45 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 11:11:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/120, 0x78}, {&(0x7f0000000f80)=""/253, 0xfd}], 0x3}}], 0x1, 0x0, &(0x7f00000046c0)) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x0) 11:11:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:51 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)) syz_open_dev$rtc(&(0x7f0000000340)='/dev/rtc#\x00', 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) getpid() getuid() openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) stat(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000008180), &(0x7f00000081c0)=0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000008200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000008280)='/dev/ptmx\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000082c0)='syz1\x00', 0x200002, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000008300)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000008340)='/selinux/enforce\x00', 0x0, 0x0) getpgrp(0x0) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008380)={{{@in=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000008480)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000084c0), &(0x7f0000008500)=0xc) socket(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000008540)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000008580)=0x1c, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f00000085c0), 0x0) syz_open_dev$evdev(&(0x7f0000008600)='/dev/input/event#\x00', 0x0, 0x0) eventfd2(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000008640)='/selinux/policy\x00', 0x0, 0x0) creat(&(0x7f0000008680)='./file0\x00', 0x0) signalfd4(0xffffffffffffff9c, &(0x7f00000086c0), 0x8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008840)={0x0, 0x0, &(0x7f0000008b00)=ANY=[], &(0x7f0000008740)='syzkaller\x00', 0x0, 0xa0, &(0x7f0000008780)=""/160}, 0x48) getsockname(0xffffffffffffffff, &(0x7f00000088c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000008940)=0x80) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008a80)={0x0, 0x0, &(0x7f0000008040), 0x0, &(0x7f0000008980)}, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)={@remote}, &(0x7f0000000200)=0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000008ac0)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 11:11:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:51 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0x1) getpid() 11:11:51 executing program 3: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 11:11:51 executing program 1: socket$key(0xf, 0x3, 0x2) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) getsockname(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000001c0)=0x80) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000300)=""/74, &(0x7f0000000400)=0x4a) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/12, 0xc) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000004340), 0x0, 0x0, &(0x7f00000044c0)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000440)) lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000004500)) openat$null(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") chroot(&(0x7f0000000480)='./file0\x00') 11:11:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x10, &(0x7f0000000340)={0x77359400}, 0x100000366) 11:11:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 11:11:51 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x0) dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000840)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x0, @remote}}) timer_settime(0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000740)=@objname={'system_u:object_r:dpkg_lock_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x0, 0x20, './file0\x00'}, 0xffffffffffffff74) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000900)) sendto$unix(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0)=@file={0x0, './file0/file0\x00'}, 0x6e) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, &(0x7f0000000480)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000a40)) io_setup(0x0, &(0x7f0000000940)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f0000000d40)) 11:11:52 executing program 4: gettid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 11:11:52 executing program 3: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 11:11:52 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x0) dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000840)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x0, @remote}}) timer_settime(0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000740)=@objname={'system_u:object_r:dpkg_lock_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x0, 0x20, './file0\x00'}, 0xffffffffffffff74) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000900)) sendto$unix(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0)=@file={0x0, './file0/file0\x00'}, 0x6e) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, &(0x7f0000000480)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000a40)) io_setup(0x0, &(0x7f0000000940)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f0000000d40)) 11:11:53 executing program 4: gettid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 11:12:00 executing program 0: sync() request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='[:\x00', 0xfffffffffffffffc) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000280), 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f00000000c0)}) vmsplice(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_names\x00') write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='ip_vti0\x00', 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 11:12:00 executing program 3: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 11:12:00 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x0) dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000840)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x0, @remote}}) timer_settime(0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000740)=@objname={'system_u:object_r:dpkg_lock_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x0, 0x20, './file0\x00'}, 0xffffffffffffff74) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000900)) sendto$unix(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0)=@file={0x0, './file0/file0\x00'}, 0x6e) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, &(0x7f0000000480)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000a40)) io_setup(0x0, &(0x7f0000000940)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f0000000d40)) 11:12:00 executing program 4: gettid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 11:12:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x10, &(0x7f0000000340)={0x77359400}, 0x100000366) 11:12:00 executing program 1: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 11:12:00 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x0) dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000840)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x0, @remote}}) timer_settime(0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000740)=@objname={'system_u:object_r:dpkg_lock_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x0, 0x20, './file0\x00'}, 0xffffffffffffff74) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000900)) sendto$unix(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0)=@file={0x0, './file0/file0\x00'}, 0x6e) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000d80)=ANY=[], 0x0, 0x0, &(0x7f0000000480)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000a40)) io_setup(0x0, &(0x7f0000000940)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f0000000d40)) 11:12:00 executing program 3: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 11:12:00 executing program 4: gettid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 11:12:01 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 11:12:01 executing program 4: listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f00000002c0)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 11:12:01 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) utimes(&(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)={{0x77359400}, {0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000001c0)=0x30) 11:12:08 executing program 0: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 11:12:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) write(r1, &(0x7f0000000000), 0xffffff92) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000240)) 11:12:08 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) utimes(&(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)={{0x77359400}, {0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000001c0)=0x30) 11:12:08 executing program 4: listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f00000002c0)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 11:12:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='setgroups\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x7) 11:12:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x10, &(0x7f0000000340)={0x77359400}, 0x100000366) 11:12:08 executing program 4: listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f00000002c0)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 11:12:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) write(r1, &(0x7f0000000000), 0xffffff92) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000240)) 11:12:09 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) utimes(&(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)={{0x77359400}, {0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000001c0)=0x30) 11:12:09 executing program 4: listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000380)}) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) pipe(&(0x7f00000002c0)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000480), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 11:12:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000640)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000300), &(0x7f0000000340)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0x74) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:12:10 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) utimes(&(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)={{0x77359400}, {0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000001c0)=0x30) 11:12:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000640)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000300), &(0x7f0000000340)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0x74) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:12:17 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ioprio_set$pid(0x0, 0x0, 0x200) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace(0x4208, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000300)=""/253, 0xfd}) 11:12:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='setgroups\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x7) 11:12:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) write(r1, &(0x7f0000000000), 0xffffff92) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000240)) 11:12:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x100000) getgid() pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001440)}) accept(0xffffffffffffffff, &(0x7f0000000400)=@nfc, &(0x7f0000000480)=0x80) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000540)=0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a037db0affaa32233333c4c2958e09d26d44dd1835c935c97d197a07c463fd7998b400ba000079aaff43d0e1464a4a0da11b0000008f49c099accf0000000031a314b706e205f3420f1beb7b7f") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, "ff0100004c060fc4b61a9acb13c3dc47f6bfd57af89e8e93edfa2ba4a603033d"}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f000004d000), 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000006c0)=ANY=[]) socket$inet(0x2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f00000009c0)}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000a80), 0x88) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @broadcast}, 0x10) 11:12:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x10, &(0x7f0000000340)={0x77359400}, 0x100000366) 11:12:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000640)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000300), &(0x7f0000000340)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0x74) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:12:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x100000) getgid() pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001440)}) accept(0xffffffffffffffff, &(0x7f0000000400)=@nfc, &(0x7f0000000480)=0x80) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000540)=0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a037db0affaa32233333c4c2958e09d26d44dd1835c935c97d197a07c463fd7998b400ba000079aaff43d0e1464a4a0da11b0000008f49c099accf0000000031a314b706e205f3420f1beb7b7f") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, "ff0100004c060fc4b61a9acb13c3dc47f6bfd57af89e8e93edfa2ba4a603033d"}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f000004d000), 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000006c0)=ANY=[]) socket$inet(0x2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f00000009c0)}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000a80), 0x88) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @broadcast}, 0x10) 11:12:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) write(r1, &(0x7f0000000000), 0xffffff92) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000240)) 11:12:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000640)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000300), &(0x7f0000000340)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0x74) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:12:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x100000) getgid() pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001440)}) accept(0xffffffffffffffff, &(0x7f0000000400)=@nfc, &(0x7f0000000480)=0x80) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000540)=0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a037db0affaa32233333c4c2958e09d26d44dd1835c935c97d197a07c463fd7998b400ba000079aaff43d0e1464a4a0da11b0000008f49c099accf0000000031a314b706e205f3420f1beb7b7f") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, "ff0100004c060fc4b61a9acb13c3dc47f6bfd57af89e8e93edfa2ba4a603033d"}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f000004d000), 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000006c0)=ANY=[]) socket$inet(0x2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f00000009c0)}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000a80), 0x88) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @broadcast}, 0x10) 11:12:19 executing program 3: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0x9d) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getpid() getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f00000000c0), &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) 11:12:19 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getpgrp(0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000500)) getpgrp(0x0) socket$unix(0x1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 11:12:21 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000780), 0x4) rt_sigpending(&(0x7f0000000cc0), 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000e80)=@pppol2tpv3in6, &(0x7f0000000700)=0xffffffffffffff98) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f40)=0x307, 0x0) seccomp(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000000)=[{0x400000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000001100)) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f00000000c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@remote}, &(0x7f0000000e00)=0x14) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000b40)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000f80)={'filter\x00', 0x0, 0x0, 0x85, [], 0x0, &(0x7f0000000500), &(0x7f0000000d00)=""/133}, &(0x7f0000000900)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000480)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)={@dev}, &(0x7f0000000a00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000600)={@multicast1}, &(0x7f0000000640)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x14) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000c80)={0x0, 0x0, 0x0, &(0x7f0000000c40)}) timer_create(0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000003c0)) timer_getoverrun(0x0) 11:12:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x100000) getgid() pwrite64(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001440)}) accept(0xffffffffffffffff, &(0x7f0000000400)=@nfc, &(0x7f0000000480)=0x80) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000540)=0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a037db0affaa32233333c4c2958e09d26d44dd1835c935c97d197a07c463fd7998b400ba000079aaff43d0e1464a4a0da11b0000008f49c099accf0000000031a314b706e205f3420f1beb7b7f") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, "ff0100004c060fc4b61a9acb13c3dc47f6bfd57af89e8e93edfa2ba4a603033d"}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f000004d000), 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000006c0)=ANY=[]) socket$inet(0x2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000940), 0x0, &(0x7f00000009c0)}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000a80), 0x88) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @broadcast}, 0x10) 11:12:21 executing program 3: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0x9d) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getpid() getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f00000000c0), &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) 11:12:21 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getpgrp(0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000500)) getpgrp(0x0) socket$unix(0x1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 11:12:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='setgroups\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x7) 11:12:21 executing program 5: getegid() getgroups(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00'}, 0x10) socket$inet(0x2, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:12:22 executing program 3: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0x9d) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getpid() getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f00000000c0), &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) 11:12:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getpgrp(0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000500)) getpgrp(0x0) socket$unix(0x1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 11:12:22 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000440), 0x291) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000480)=""/223) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) geteuid() setreuid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) syncfs(0xffffffffffffffff) 11:12:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getpgrp(0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000500)) getpgrp(0x0) socket$unix(0x1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) gettid() dup(0xffffffffffffffff) fchmodat(0xffffffffffffffff, &(0x7f0000004480)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000021c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) 11:12:23 executing program 3: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0x9d) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getpid() getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000001940)=0xc) getgroups(0x0, &(0x7f0000001980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f00000000c0), &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) 11:12:23 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000440), 0x291) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000480)=""/223) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) geteuid() setreuid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) syncfs(0xffffffffffffffff) 11:12:30 executing program 0: getpgrp(0xffffffffffffffff) sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000300)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000440)={0xb}, 0xb) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000240)={0x90}, 0x90) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:12:30 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000440), 0x291) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000480)=""/223) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) geteuid() setreuid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) syncfs(0xffffffffffffffff) 11:12:30 executing program 3: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) clock_gettime(0x0, &(0x7f0000000440)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) 11:12:30 executing program 4: ioperm(0x0, 0xb2c0, 0x0) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 11:12:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='setgroups\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x7) 11:12:30 executing program 5: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") uname(&(0x7f0000000040)=""/140) tkill(0x0, 0x0) 11:12:31 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000440), 0x291) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000480)=""/223) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) geteuid() setreuid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) syncfs(0xffffffffffffffff) 11:12:31 executing program 3: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) clock_gettime(0x0, &(0x7f0000000440)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) 11:12:31 executing program 4: ioperm(0x0, 0xb2c0, 0x0) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 11:12:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@dev, @local, @local}, 0xc8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:12:32 executing program 3: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) clock_gettime(0x0, &(0x7f0000000440)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) 11:12:32 executing program 4: ioperm(0x0, 0xb2c0, 0x0) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 11:12:36 executing program 0: clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000001c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cad532a9a14ba14be56b6a41800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) eventfd2(0x0, 0x0) 11:12:36 executing program 3: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) clock_gettime(0x0, &(0x7f0000000440)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) 11:12:36 executing program 4: ioperm(0x0, 0xb2c0, 0x0) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 11:12:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@dev, @local, @local}, 0xc8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:12:36 executing program 1: link(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') request_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580), &(0x7f00000005c0)='\x00', 0xfffffffffffffff8) add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000880), &(0x7f0000000a00)='system\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000ac0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000004c0)) preadv(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/34) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xffffffffffffff01) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000003c0)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000000c0)) umount2(&(0x7f00000008c0)='./file0\x00', 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000002c0)=""/172) keyctl$negate(0xd, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) epoll_create(0x0) listxattr(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000900)=""/194, 0xc2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$packet(0x11, 0x0, 0x300) socket$inet6(0xa, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00006cdffb), 0x0) getrlimit(0x0, &(0x7f0000000200)) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfec4, 0x0, &(0x7f0000001000)={0x2, 0x0, @broadcast}, 0x10) 11:12:36 executing program 5: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") uname(&(0x7f0000000040)=""/140) tkill(0x0, 0x0) 11:12:37 executing program 3: accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:12:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@dev, @local, @local}, 0xc8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:12:37 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:12:37 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:12:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@dev, @local, @local}, 0xc8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:12:38 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:12:44 executing program 0: set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) dup(0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000340)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @dev}, &(0x7f0000000600)=0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/loop-control\x00', 0x0, 0x0) ppoll(&(0x7f0000000680), 0x0, &(0x7f00000006c0), &(0x7f0000000700), 0x8) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:12:44 executing program 3: accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:12:44 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:12:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9cec4218d5fa200e000001837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7660fe03cdee2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={"c90000000000000000ea00", &(0x7f0000000140)=ANY=[]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001640)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getgroups(0x0, &(0x7f00000018c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) getgroups(0x0, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001fc0)) lstat(&(0x7f0000002000)='./file0/file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002140)) getpgrp(0x0) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002b00)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000034c0)) getuid() getgroups(0x0, &(0x7f0000003500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) lstat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000036c0)) geteuid() stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) 11:12:44 executing program 5: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") uname(&(0x7f0000000040)=""/140) tkill(0x0, 0x0) 11:12:44 executing program 1: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:12:45 executing program 4: request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") 11:12:45 executing program 3: accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:12:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9cec4218d5fa200e000001837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7660fe03cdee2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={"c90000000000000000ea00", &(0x7f0000000140)=ANY=[]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001640)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getgroups(0x0, &(0x7f00000018c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) getgroups(0x0, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001fc0)) lstat(&(0x7f0000002000)='./file0/file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002140)) getpgrp(0x0) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002b00)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000034c0)) getuid() getgroups(0x0, &(0x7f0000003500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) lstat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000036c0)) geteuid() stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) 11:12:45 executing program 4: request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") 11:12:46 executing program 3: accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:12:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9cec4218d5fa200e000001837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7660fe03cdee2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={"c90000000000000000ea00", &(0x7f0000000140)=ANY=[]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001640)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getgroups(0x0, &(0x7f00000018c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) getgroups(0x0, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001fc0)) lstat(&(0x7f0000002000)='./file0/file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002140)) getpgrp(0x0) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002b00)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000034c0)) getuid() getgroups(0x0, &(0x7f0000003500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) lstat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000036c0)) geteuid() stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) 11:12:53 executing program 0: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300), 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 11:12:53 executing program 4: request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") 11:12:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x38}}, 0x0) 11:12:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9cec4218d5fa200e000001837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7660fe03cdee2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={"c90000000000000000ea00", &(0x7f0000000140)=ANY=[]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001640)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getgroups(0x0, &(0x7f00000018c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) getgroups(0x0, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001fc0)) lstat(&(0x7f0000002000)='./file0/file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002140)) getpgrp(0x0) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002b00)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000034c0)) getuid() getgroups(0x0, &(0x7f0000003500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) lstat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000036c0)) geteuid() stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) 11:12:53 executing program 5: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") uname(&(0x7f0000000040)=""/140) tkill(0x0, 0x0) 11:12:53 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mprotect(&(0x7f000044a000/0x3000)=nil, 0x3000, 0x2000008) 11:12:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x38}}, 0x0) 11:12:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x38}}, 0x0) 11:12:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x38}}, 0x0) 11:12:53 executing program 3: timerfd_create(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/230) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getresgid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgrp(0x0) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@loopback, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgroups(0x0, &(0x7f0000002240)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003dc0)) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 11:12:54 executing program 4: request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") 11:12:54 executing program 2: ioperm(0x0, 0xb2c0, 0x200000004000) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:12:59 executing program 0: getrlimit(0x0, &(0x7f0000000340)) pipe2(&(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) 11:12:59 executing program 3: timerfd_create(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/230) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getresgid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgrp(0x0) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@loopback, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgroups(0x0, &(0x7f0000002240)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003dc0)) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 11:12:59 executing program 4: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'erspan0\x00'}) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000200)}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000007c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getpid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000500)=""/5, 0x5}, 0x120) seccomp(0x0, 0x0, &(0x7f00000006c0)={0x0, &(0x7f0000000680)}) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x2ed, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:12:59 executing program 2: ioperm(0x0, 0xb2c0, 0x200000004000) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:12:59 executing program 1: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0x18b) getpid() pipe2(&(0x7f0000000140), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/215, 0xd7, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x10, &(0x7f0000000880)={&(0x7f0000000540)=""/130, 0x82}}, 0x10) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) creat(&(0x7f0000000380)='./file0/file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) ptrace(0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000980)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000180)=""/244) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:12:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f00000001c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)=ANY=[]}) 11:13:00 executing program 2: ioperm(0x0, 0xb2c0, 0x200000004000) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:13:00 executing program 3: timerfd_create(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/230) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getresgid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgrp(0x0) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@loopback, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgroups(0x0, &(0x7f0000002240)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003dc0)) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 11:13:00 executing program 4: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'erspan0\x00'}) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000200)}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000007c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getpid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000500)=""/5, 0x5}, 0x120) seccomp(0x0, 0x0, &(0x7f00000006c0)={0x0, &(0x7f0000000680)}) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x2ed, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:01 executing program 2: ioperm(0x0, 0xb2c0, 0x200000004000) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:13:01 executing program 3: timerfd_create(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/230) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getpgid(0xffffffffffffffff) stat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getresgid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001e40)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgrp(0x0) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@loopback, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgroups(0x0, &(0x7f0000002240)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003dc0)) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 11:13:01 executing program 4: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'erspan0\x00'}) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000200)}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000007c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getpid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000500)=""/5, 0x5}, 0x120) seccomp(0x0, 0x0, &(0x7f00000006c0)={0x0, &(0x7f0000000680)}) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x2ed, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:06 executing program 0: getrlimit(0x0, &(0x7f0000000340)) pipe2(&(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) 11:13:06 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x430102, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000009c0)={'veth1_to_bond\x00', {0x2, 0x0, @dev}}) gettid() write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000500)={0x86, 0x7d, 0x0, {{0x0, 0x60, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe, 'veth1_to_bond\x00', 0x0, "", 0xe, 'veth1_to_bond\x00', 0x11, '/selinux/enforce\x00'}, 0x11, '/selinux/enforce\x00'}}, 0x86) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 11:13:06 executing program 4: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'erspan0\x00'}) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000200)}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000007c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getpid() gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000500)=""/5, 0x5}, 0x120) seccomp(0x0, 0x0, &(0x7f00000006c0)={0x0, &(0x7f0000000680)}) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x2ed, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:06 executing program 2: clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 11:13:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f00000001c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)=ANY=[]}) 11:13:06 executing program 1: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0x18b) getpid() pipe2(&(0x7f0000000140), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/215, 0xd7, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x10, &(0x7f0000000880)={&(0x7f0000000540)=""/130, 0x82}}, 0x10) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) creat(&(0x7f0000000380)='./file0/file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) ptrace(0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000980)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000180)=""/244) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000000000)=0x3, 0x327) 11:13:07 executing program 2: clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 11:13:07 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x430102, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000009c0)={'veth1_to_bond\x00', {0x2, 0x0, @dev}}) gettid() write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000500)={0x86, 0x7d, 0x0, {{0x0, 0x60, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe, 'veth1_to_bond\x00', 0x0, "", 0xe, 'veth1_to_bond\x00', 0x11, '/selinux/enforce\x00'}, 0x11, '/selinux/enforce\x00'}}, 0x86) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 11:13:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000000000)=0x3, 0x327) 11:13:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000000000)=0x3, 0x327) 11:13:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x1, &(0x7f0000000000)=0x3, 0x327) 11:13:11 executing program 0: getrlimit(0x0, &(0x7f0000000340)) pipe2(&(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) 11:13:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000300), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x29, 0x201}, 0x14}}, 0x0) 11:13:11 executing program 2: clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 11:13:11 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x430102, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000009c0)={'veth1_to_bond\x00', {0x2, 0x0, @dev}}) gettid() write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000500)={0x86, 0x7d, 0x0, {{0x0, 0x60, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe, 'veth1_to_bond\x00', 0x0, "", 0xe, 'veth1_to_bond\x00', 0x11, '/selinux/enforce\x00'}, 0x11, '/selinux/enforce\x00'}}, 0x86) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 11:13:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f00000001c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)=ANY=[]}) 11:13:12 executing program 1: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0x18b) getpid() pipe2(&(0x7f0000000140), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/215, 0xd7, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x10, &(0x7f0000000880)={&(0x7f0000000540)=""/130, 0x82}}, 0x10) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) creat(&(0x7f0000000380)='./file0/file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) ptrace(0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000980)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000180)=""/244) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000300), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x29, 0x201}, 0x14}}, 0x0) 11:13:12 executing program 2: clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 11:13:12 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x430102, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000009c0)={'veth1_to_bond\x00', {0x2, 0x0, @dev}}) gettid() write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000500)={0x86, 0x7d, 0x0, {{0x0, 0x60, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe, 'veth1_to_bond\x00', 0x0, "", 0xe, 'veth1_to_bond\x00', 0x11, '/selinux/enforce\x00'}, 0x11, '/selinux/enforce\x00'}}, 0x86) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 11:13:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000300), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x29, 0x201}, 0x14}}, 0x0) 11:13:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000300), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x29, 0x201}, 0x14}}, 0x0) 11:13:12 executing program 4: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f000000da00)='./file0\x00', 0x0) request_key(&(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0), &(0x7f0000000540)='./cgroup/syz1\x00', 0xfffffffffffffffc) request_key(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), &(0x7f0000000640)='/dev/rtc0\x00', 0xffffffffffffffff) request_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000300)='+$wlan1}*lovboxnet1GPLolo\x00', 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000780)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) prctl$intptr(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000740)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in6=@local, @in6=@loopback}}, {{@in6=@ipv4}}}, &(0x7f0000001dc0)=0xe8) getegid() getpid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f40)) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003740)) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000038c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000039c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003a00)) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004e80)='\x00'}, 0x30) geteuid() stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005000)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005100)=0xe8) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000005340)=0xe8) stat(&(0x7f0000005380)='./file0/file0\x00', &(0x7f00000053c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000069c0)='em1user\'mime_typemd5sumposix_acl_accessproc\x00'}, 0x30) getuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a80)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f0000006a40)="706f7369785f61636c5f61636365737325261a402865746830707070312d2e2700"}, 0x30) lstat(&(0x7f0000006ac0)='./file0\x00', &(0x7f0000006b00)) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 11:13:17 executing program 0: getrlimit(0x0, &(0x7f0000000340)) pipe2(&(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) 11:13:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001580)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000015c0)) 11:13:17 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) 11:13:17 executing program 4: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f000000da00)='./file0\x00', 0x0) request_key(&(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0), &(0x7f0000000540)='./cgroup/syz1\x00', 0xfffffffffffffffc) request_key(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), &(0x7f0000000640)='/dev/rtc0\x00', 0xffffffffffffffff) request_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000300)='+$wlan1}*lovboxnet1GPLolo\x00', 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000780)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) prctl$intptr(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000740)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in6=@local, @in6=@loopback}}, {{@in6=@ipv4}}}, &(0x7f0000001dc0)=0xe8) getegid() getpid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f40)) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003740)) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000038c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000039c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003a00)) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004e80)='\x00'}, 0x30) geteuid() stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005000)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005100)=0xe8) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000005340)=0xe8) stat(&(0x7f0000005380)='./file0/file0\x00', &(0x7f00000053c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000069c0)='em1user\'mime_typemd5sumposix_acl_accessproc\x00'}, 0x30) getuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a80)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f0000006a40)="706f7369785f61636c5f61636365737325261a402865746830707070312d2e2700"}, 0x30) lstat(&(0x7f0000006ac0)='./file0\x00', &(0x7f0000006b00)) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 11:13:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f00000001c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)=ANY=[]}) 11:13:17 executing program 1: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0x18b) getpid() pipe2(&(0x7f0000000140), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/215, 0xd7, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x10, &(0x7f0000000880)={&(0x7f0000000540)=""/130, 0x82}}, 0x10) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) creat(&(0x7f0000000380)='./file0/file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) ptrace(0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000980)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000180)=""/244) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:13:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001580)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000015c0)) 11:13:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001580)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000015c0)) 11:13:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001580)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000015c0)) 11:13:17 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) unshare(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip6gretap0\x00', {0x2, 0x0, @broadcast}}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) time(&(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[]}}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/status\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2}, &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001240)={0x0, @rand_addr, @rand_addr}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@remote}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @loopback, @local}, &(0x7f0000001440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000018c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000019c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={@multicast1, @multicast2}, &(0x7f0000001bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001dc0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001e00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001e40), &(0x7f0000001e80)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001ec0)=@hci, &(0x7f0000001f40)=0x80) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000400), 0xc, &(0x7f0000002880)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000500)) 11:13:18 executing program 4: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f000000da00)='./file0\x00', 0x0) request_key(&(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0), &(0x7f0000000540)='./cgroup/syz1\x00', 0xfffffffffffffffc) request_key(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), &(0x7f0000000640)='/dev/rtc0\x00', 0xffffffffffffffff) request_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000300)='+$wlan1}*lovboxnet1GPLolo\x00', 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000780)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) prctl$intptr(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000740)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in6=@local, @in6=@loopback}}, {{@in6=@ipv4}}}, &(0x7f0000001dc0)=0xe8) getegid() getpid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f40)) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003740)) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000038c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000039c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003a00)) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004e80)='\x00'}, 0x30) geteuid() stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005000)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005100)=0xe8) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000005340)=0xe8) stat(&(0x7f0000005380)='./file0/file0\x00', &(0x7f00000053c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000069c0)='em1user\'mime_typemd5sumposix_acl_accessproc\x00'}, 0x30) getuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a80)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f0000006a40)="706f7369785f61636c5f61636365737325261a402865746830707070312d2e2700"}, 0x30) lstat(&(0x7f0000006ac0)='./file0\x00', &(0x7f0000006b00)) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 11:13:18 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) 11:13:24 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='.\x00') mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1020000, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000140), &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000180)) 11:13:24 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) unshare(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip6gretap0\x00', {0x2, 0x0, @broadcast}}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) time(&(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[]}}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/status\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2}, &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001240)={0x0, @rand_addr, @rand_addr}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@remote}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @loopback, @local}, &(0x7f0000001440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000018c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000019c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={@multicast1, @multicast2}, &(0x7f0000001bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001dc0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001e00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001e40), &(0x7f0000001e80)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001ec0)=@hci, &(0x7f0000001f40)=0x80) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000400), 0xc, &(0x7f0000002880)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000500)) 11:13:24 executing program 0: umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180), 0x10) socket$key(0xf, 0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 11:13:24 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) 11:13:24 executing program 4: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f000000da00)='./file0\x00', 0x0) request_key(&(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0), &(0x7f0000000540)='./cgroup/syz1\x00', 0xfffffffffffffffc) request_key(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), &(0x7f0000000640)='/dev/rtc0\x00', 0xffffffffffffffff) request_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000300)='+$wlan1}*lovboxnet1GPLolo\x00', 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000780)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) prctl$intptr(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000740)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in6=@local, @in6=@loopback}}, {{@in6=@ipv4}}}, &(0x7f0000001dc0)=0xe8) getegid() getpid() stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f40)) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003740)) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000038c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000039c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003a00)) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004e80)='\x00'}, 0x30) geteuid() stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005000)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005100)=0xe8) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000005340)=0xe8) stat(&(0x7f0000005380)='./file0/file0\x00', &(0x7f00000053c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000069c0)='em1user\'mime_typemd5sumposix_acl_accessproc\x00'}, 0x30) getuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006a80)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f0000006a40)="706f7369785f61636c5f61636365737325261a402865746830707070312d2e2700"}, 0x30) lstat(&(0x7f0000006ac0)='./file0\x00', &(0x7f0000006b00)) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 11:13:24 executing program 5: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f0000000440)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000500), 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c) getgid() 11:13:25 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) unshare(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip6gretap0\x00', {0x2, 0x0, @broadcast}}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) time(&(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[]}}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/status\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2}, &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001240)={0x0, @rand_addr, @rand_addr}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@remote}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @loopback, @local}, &(0x7f0000001440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000018c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000019c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={@multicast1, @multicast2}, &(0x7f0000001bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001dc0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001e00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001e40), &(0x7f0000001e80)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001ec0)=@hci, &(0x7f0000001f40)=0x80) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000400), 0xc, &(0x7f0000002880)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000500)) 11:13:25 executing program 4: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000005c0)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) getuid() getuid() stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:13:25 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) 11:13:26 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) 11:13:26 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) unshare(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip6gretap0\x00', {0x2, 0x0, @broadcast}}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) time(&(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[]}}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/status\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2}, &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001240)={0x0, @rand_addr, @rand_addr}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@remote}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @loopback, @local}, &(0x7f0000001440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000018c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000019c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={@multicast1, @multicast2}, &(0x7f0000001bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001dc0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001e00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001e40), &(0x7f0000001e80)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001ec0)=@hci, &(0x7f0000001f40)=0x80) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000400), 0xc, &(0x7f0000002880)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000500)) 11:13:26 executing program 4: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000005c0)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) getuid() getuid() stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:13:28 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='.\x00') mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1020000, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000140), &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000180)) 11:13:28 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) 11:13:32 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000780)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 11:13:32 executing program 2: select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', "766d6e6574306367726f7570a46b657972696e6700"}, &(0x7f00000001c0)='\x00', 0x1, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000200)) prctl$setendian(0x14, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) getuid() quotactl(0x0, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480)) keyctl$get_security(0x11, 0x0, &(0x7f0000000400)=""/12, 0xc) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:13:32 executing program 4: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000005c0)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) getuid() getuid() stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:13:32 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f00000001c0), &(0x7f0000000200)='self:)\'*\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000400), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000580), &(0x7f00000005c0)=""/118, 0x76, &(0x7f0000000680)={&(0x7f0000000640)={'speck128-generic\x00'}}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc8f01eec4c13084930f0000410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d22e0f6e5fb21c1d66430f129000000000000244fe80cc39390f38302f450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbee5df122c989879d3") 11:13:32 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) 11:13:32 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='.\x00') mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1020000, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000140), &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000180)) 11:13:33 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) 11:13:33 executing program 4: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f00000005c0)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) getuid() getuid() stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d40), 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:13:33 executing program 2: select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', "766d6e6574306367726f7570a46b657972696e6700"}, &(0x7f00000001c0)='\x00', 0x1, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000200)) prctl$setendian(0x14, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) getuid() quotactl(0x0, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480)) keyctl$get_security(0x11, 0x0, &(0x7f0000000400)=""/12, 0xc) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:13:34 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() dup(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002180)=0xe8) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:34 executing program 4: socket(0x3, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0xffffffffffffffff, &(0x7f0000000040)) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000500)="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") 11:13:34 executing program 2: select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', "766d6e6574306367726f7570a46b657972696e6700"}, &(0x7f00000001c0)='\x00', 0x1, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000200)) prctl$setendian(0x14, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) getuid() quotactl(0x0, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480)) keyctl$get_security(0x11, 0x0, &(0x7f0000000400)=""/12, 0xc) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:13:39 executing program 0: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000340)=""/238) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000180)={'tunl0\x00'}) 11:13:39 executing program 4: socket(0x3, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0xffffffffffffffff, &(0x7f0000000040)) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000500)="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") 11:13:39 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() dup(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002180)=0xe8) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:39 executing program 2: select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', "766d6e6574306367726f7570a46b657972696e6700"}, &(0x7f00000001c0)='\x00', 0x1, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000200)) prctl$setendian(0x14, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) getuid() quotactl(0x0, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480)) keyctl$get_security(0x11, 0x0, &(0x7f0000000400)=""/12, 0xc) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:13:39 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='.\x00') mount(&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x1020000, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000140), &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000180)) 11:13:39 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f00000001c0), &(0x7f0000000200)='self:)\'*\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000400), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000580), &(0x7f00000005c0)=""/118, 0x76, &(0x7f0000000680)={&(0x7f0000000640)={'speck128-generic\x00'}}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc8f01eec4c13084930f0000410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d22e0f6e5fb21c1d66430f129000000000000244fe80cc39390f38302f450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbee5df122c989879d3") 11:13:39 executing program 4: socket(0x3, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0xffffffffffffffff, &(0x7f0000000040)) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000500)="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") 11:13:40 executing program 4: socket(0x3, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0xffffffffffffffff, &(0x7f0000000040)) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000500)="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") 11:13:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000001380)='gid_map\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000001c00)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000001c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001200)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000200)=""/4096, 0x1000}, 0x120) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000001340)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) 11:13:40 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() dup(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002180)=0xe8) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:40 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000001380)='gid_map\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000001c00)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000001c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001200)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000200)=""/4096, 0x1000}, 0x120) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000001340)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) 11:13:47 executing program 0: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000340)=""/238) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000180)={'tunl0\x00'}) 11:13:47 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() dup(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002180)=0xe8) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:47 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000001380)='gid_map\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000001c00)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000001c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001200)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000200)=""/4096, 0x1000}, 0x120) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000001340)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) 11:13:47 executing program 1: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:47 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f00000001c0), &(0x7f0000000200)='self:)\'*\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000400), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000580), &(0x7f00000005c0)=""/118, 0x76, &(0x7f0000000680)={&(0x7f0000000640)={'speck128-generic\x00'}}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc8f01eec4c13084930f0000410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d22e0f6e5fb21c1d66430f129000000000000244fe80cc39390f38302f450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbee5df122c989879d3") 11:13:47 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:47 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000400)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78}, 0x78) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) 11:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000001380)='gid_map\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000001c00)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000001c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001200)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000200)=""/4096, 0x1000}, 0x120) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000001340)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)) 11:13:48 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:48 executing program 4: epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) getrusage(0x0, &(0x7f00000019c0)) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @local}, &(0x7f0000000540)=0xc) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000280)) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0xfffffe22) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) io_setup(0x0, &(0x7f0000000380)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x1) io_submit(0x0, 0x0, &(0x7f0000001800)) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000017c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) 11:13:48 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000400)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78}, 0x78) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) 11:13:53 executing program 0: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000340)=""/238) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000180)={'tunl0\x00'}) 11:13:53 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x60442, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@nl, &(0x7f0000000300)=0x32e) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) geteuid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0xff1f) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getegid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:53 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000400)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78}, 0x78) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) 11:13:53 executing program 4: epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) getrusage(0x0, &(0x7f00000019c0)) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @local}, &(0x7f0000000540)=0xc) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000280)) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0xfffffe22) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) io_setup(0x0, &(0x7f0000000380)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x1) io_submit(0x0, 0x0, &(0x7f0000001800)) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000017c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) 11:13:55 executing program 1: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:13:55 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$nl_route(0x10, 0x3, 0x0) getpgrp(0x0) sched_setparam(0x0, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000400)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78}, 0x78) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) 11:13:55 executing program 4: epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) getrusage(0x0, &(0x7f00000019c0)) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @local}, &(0x7f0000000540)=0xc) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000280)) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0xfffffe22) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) io_setup(0x0, &(0x7f0000000380)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x1) io_submit(0x0, 0x0, &(0x7f0000001800)) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000017c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) 11:13:55 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x60442, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@nl, &(0x7f0000000300)=0x32e) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) geteuid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0xff1f) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getegid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:55 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f00000001c0), &(0x7f0000000200)='self:)\'*\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000400), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000580), &(0x7f00000005c0)=""/118, 0x76, &(0x7f0000000680)={&(0x7f0000000640)={'speck128-generic\x00'}}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc8f01eec4c13084930f0000410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d22e0f6e5fb21c1d66430f129000000000000244fe80cc39390f38302f450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbee5df122c989879d3") 11:13:55 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000980)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001280)) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) 11:13:55 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x60442, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@nl, &(0x7f0000000300)=0x32e) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) geteuid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0xff1f) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getegid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:13:55 executing program 4: epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) getrusage(0x0, &(0x7f00000019c0)) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @local}, &(0x7f0000000540)=0xc) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000280)) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0xfffffe22) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) io_setup(0x0, &(0x7f0000000380)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x1) io_submit(0x0, 0x0, &(0x7f0000001800)) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000017c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) 11:14:00 executing program 0: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000340)=""/238) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000180)={'tunl0\x00'}) 11:14:00 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x60442, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@nl, &(0x7f0000000300)=0x32e) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) geteuid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0xff1f) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getegid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:14:00 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000600)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:14:00 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000980)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001280)) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) 11:14:01 executing program 1: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'ifb0\x00'}) ftruncate(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[], &(0x7f00000002c0)) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0), &(0x7f0000000700)='L-', 0xfffffffffffffff8) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004140)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000042c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000073c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000074c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:01 executing program 2: select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) getitimer(0x0, &(0x7f0000000240)) socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000480), &(0x7f0000000440)=0x4) time(&(0x7f0000000640)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f00000003c0)) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getegid() syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000580), 0x10) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) poll(&(0x7f0000000600), 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 11:14:01 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000600)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:14:01 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000980)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001280)) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) 11:14:01 executing program 5: utimes(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={{0x77359400}}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) 11:14:01 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000980)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001280)) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) 11:14:02 executing program 2: keyctl$set_reqkey_keyring(0x10, 0xffbbffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/context\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/create\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0120fef69dc0f01eec4627d34ac8682f9000073fe19fa38b20f0f211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file1\x00', &(0x7f00000002c0)='./file0\x00') finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) 11:14:02 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000600)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:14:03 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000600)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:14:03 executing program 3: timer_create(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000200), &(0x7f00000002c0)}}, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r2, 0xa, 0x12) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001c4, 0x0) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) 11:14:03 executing program 0: timer_create(0xfffffffffffffffd, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:03 executing program 2: keyctl$set_reqkey_keyring(0x10, 0xffbbffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/context\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/create\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0120fef69dc0f01eec4627d34ac8682f9000073fe19fa38b20f0f211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file1\x00', &(0x7f00000002c0)='./file0\x00') finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) 11:14:04 executing program 2: keyctl$set_reqkey_keyring(0x10, 0xffbbffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/context\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/create\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0120fef69dc0f01eec4627d34ac8682f9000073fe19fa38b20f0f211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file1\x00', &(0x7f00000002c0)='./file0\x00') finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) 11:14:04 executing program 3: timer_create(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000200), &(0x7f00000002c0)}}, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r2, 0xa, 0x12) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001c4, 0x0) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) 11:14:04 executing program 1: signalfd(0xffffffffffffff9c, &(0x7f0000000280), 0x8) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000440)) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000600)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000640), &(0x7f0000000680)=0x4) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) clock_settime(0x0, &(0x7f0000000080)) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000300)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000240)) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/access\x00', 0x2, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/187, 0xbb, 0x0, &(0x7f0000000700)=@sco, 0x32e) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00') getegid() syz_execute_func(&(0x7f0000000840)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe2c421405c4cae0626f00fbb9500000000") 11:14:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:05 executing program 5: utimes(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={{0x77359400}}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) 11:14:05 executing program 3: timer_create(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000200), &(0x7f00000002c0)}}, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r2, 0xa, 0x12) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001c4, 0x0) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) 11:14:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:05 executing program 2: keyctl$set_reqkey_keyring(0x10, 0xffbbffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/context\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/create\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0120fef69dc0f01eec4627d34ac8682f9000073fe19fa38b20f0f211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file1\x00', &(0x7f00000002c0)='./file0\x00') finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) 11:14:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:06 executing program 3: timer_create(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000200), &(0x7f00000002c0)}}, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r2, 0xa, 0x12) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001c4, 0x0) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) 11:14:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000140)=0x75) 11:14:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:07 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0xfffffffffffffee4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000840), &(0x7f0000000880)='/dev/full\x00', 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() io_setup(0x0, &(0x7f0000000040)) io_setup(0x0, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 11:14:08 executing program 1: getgroups(0x21b, &(0x7f0000000400)) stat(&(0x7f0000001840)='./file0/file0\x00', &(0x7f00000017c0)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000001940), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000015c0)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), &(0x7f0000000280)=0x4) openat$urandom(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000500)) ppoll(&(0x7f00000004c0), 0x0, &(0x7f0000000540), &(0x7f0000000580), 0x8) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) keyctl$get_security(0x11, 0x0, &(0x7f00000005c0)=""/4096, 0x1000) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000180)}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000480)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000001900)) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/63) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000001700), &(0x7f0000001780)=0x68) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000001600)="75736572006990ccca340fb2ff496c6225cb53f582dc88d473af559334f9716aeff33ca8d22199d3e4f98152594e344c59f2b9977adb99206a76ca10a9a7b7fc1ca5037333d435e928c9eedbbe52c5d76f4955937a", &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) 11:14:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:11 executing program 5: utimes(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={{0x77359400}}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) 11:14:11 executing program 4: time(&(0x7f0000000580)) rt_sigpending(&(0x7f00000005c0), 0xfffffffffffffd0c) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") setrlimit(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:11 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0xfffffffffffffee4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000840), &(0x7f0000000880)='/dev/full\x00', 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() io_setup(0x0, &(0x7f0000000040)) io_setup(0x0, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 11:14:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0x8, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000a80)}, 0x0) 11:14:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000140)=0x75) 11:14:11 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgid(0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0x1a3) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 11:14:11 executing program 4: time(&(0x7f0000000580)) rt_sigpending(&(0x7f00000005c0), 0xfffffffffffffd0c) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") setrlimit(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:11 executing program 4: time(&(0x7f0000000580)) rt_sigpending(&(0x7f00000005c0), 0xfffffffffffffd0c) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") setrlimit(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:12 executing program 4: time(&(0x7f0000000580)) rt_sigpending(&(0x7f00000005c0), 0xfffffffffffffd0c) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") setrlimit(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)={{{@in6=@ipv4}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002640)=0xe8) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000028c0)) lstat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f00000001c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) syz_execute_func(&(0x7f0000000040)="c402cd9aa200000000643e2ecf660f3a158ce3000000217e41a58fc94893b20e000000de6f1940ca0e00450f380151f6c4e1b1621419c4c2b5acf4") 11:14:14 executing program 1: umount2(&(0x7f00000006c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) listxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000740)=""/174, 0xae) sigaltstack(&(0x7f0000e00000/0x200000)=nil, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f00000006c0)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0xfdb7) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) gettid() tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpgid(0x0) wait4(0x0, &(0x7f0000000300), 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001880), 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000180), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) getpgid(0xffffffffffffffff) 11:14:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)={{{@in6=@ipv4}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002640)=0xe8) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000028c0)) lstat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f00000001c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) syz_execute_func(&(0x7f0000000040)="c402cd9aa200000000643e2ecf660f3a158ce3000000217e41a58fc94893b20e000000de6f1940ca0e00450f380151f6c4e1b1621419c4c2b5acf4") 11:14:17 executing program 5: utimes(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={{0x77359400}}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) 11:14:17 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0xfffffffffffffee4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000840), &(0x7f0000000880)='/dev/full\x00', 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() io_setup(0x0, &(0x7f0000000040)) io_setup(0x0, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 11:14:17 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgid(0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0x1a3) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 11:14:17 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000140)=0x75) 11:14:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)={{{@in6=@ipv4}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002640)=0xe8) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000028c0)) lstat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f00000001c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) syz_execute_func(&(0x7f0000000040)="c402cd9aa200000000643e2ecf660f3a158ce3000000217e41a58fc94893b20e000000de6f1940ca0e00450f380151f6c4e1b1621419c4c2b5acf4") 11:14:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)={{{@in6=@ipv4}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002640)=0xe8) lstat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000028c0)) lstat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000002fc0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f00000001c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) syz_execute_func(&(0x7f0000000040)="c402cd9aa200000000643e2ecf660f3a158ce3000000217e41a58fc94893b20e000000de6f1940ca0e00450f380151f6c4e1b1621419c4c2b5acf4") 11:14:18 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:18 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0xfffffffffffffee4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000840), &(0x7f0000000880)='/dev/full\x00', 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() io_setup(0x0, &(0x7f0000000040)) io_setup(0x0, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 11:14:18 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgid(0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0x1a3) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 11:14:19 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:21 executing program 1: umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000780)='cpuset\x00') connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180), 0x10) 11:14:21 executing program 2: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/199, &(0x7f00000002c0)=0xc7) restart_syscall() getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000480)) select(0x40, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") getegid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) 11:14:25 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:25 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgid(0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0x1a3) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 11:14:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000140)=0x75) 11:14:25 executing program 2: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/199, &(0x7f00000002c0)=0xc7) restart_syscall() getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000480)) select(0x40, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") getegid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) 11:14:25 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:14:26 executing program 2: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/199, &(0x7f00000002c0)=0xc7) restart_syscall() getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000480)) select(0x40, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") getegid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) 11:14:26 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:14:26 executing program 2: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/199, &(0x7f00000002c0)=0xc7) restart_syscall() getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000480)) select(0x40, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") getegid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) 11:14:26 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:27 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:14:30 executing program 1: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000003c0)=""/192) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") getuid() ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000480)) quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000300), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) 11:14:30 executing program 2: set_robust_list(&(0x7f0000000600)={&(0x7f00000005c0)={&(0x7f0000000080)}}, 0xa) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000500)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000380)=""/155, 0x9b, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) 11:14:30 executing program 0: eventfd(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/access\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002280)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000002240)=':,%\x00'}, 0x30) geteuid() getresgid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000023c0), &(0x7f0000002400)=0xc) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002440)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in=@dev, @in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000025c0)=0xe8) getgid() gettid() fstat(0xffffffffffffffff, &(0x7f0000002600)) getresgid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002800), 0x0, 0x0) 11:14:30 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000003c0)=""/40) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 11:14:30 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:14:30 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000003c0)=""/40) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 11:14:32 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @broadcast}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/llc\x00') syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460e01eec46219b98100000000262e6426f30f2b05090000003f") 11:14:32 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000003c0)=""/40) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 11:14:32 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000011c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:14:32 executing program 2: set_robust_list(&(0x7f0000000600)={&(0x7f00000005c0)={&(0x7f0000000080)}}, 0xa) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000500)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000380)=""/155, 0x9b, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) 11:14:33 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000003c0)=""/40) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 11:14:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/110, 0x6e}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 11:14:33 executing program 1: futex(&(0x7f00000000c0), 0x4, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000017c0)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) writev(0xffffffffffffffff, &(0x7f0000000600), 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000300)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000018c0)=""/192) finit_module(0xffffffffffffffff, &(0x7f0000001980)='selinuxnodevproc+\x00', 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280), 0x4) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000001a40), 0x0, 0x94dec4fe) bind$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:14:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/110, 0x6e}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 11:14:33 executing program 0: socketpair(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) tkill(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000180)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) syz_execute_func(&(0x7f0000000240)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:14:33 executing program 2: set_robust_list(&(0x7f0000000600)={&(0x7f00000005c0)={&(0x7f0000000080)}}, 0xa) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000500)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000380)=""/155, 0x9b, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) 11:14:33 executing program 3: uname(&(0x7f0000000040)=""/109) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) clock_gettime(0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000640)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000680), 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) pipe(&(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'veth0_to_bridge\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000ec0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000300)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000000c0)='filter\x00', 0x0) 11:14:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/110, 0x6e}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 11:14:34 executing program 5: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000480)=0x8) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000500)) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:14:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/110, 0x6e}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 11:14:34 executing program 2: set_robust_list(&(0x7f0000000600)={&(0x7f00000005c0)={&(0x7f0000000080)}}, 0xa) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000500)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000380)=""/155, 0x9b, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) 11:14:34 executing program 3: uname(&(0x7f0000000040)=""/109) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) clock_gettime(0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000640)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000680), 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) pipe(&(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'veth0_to_bridge\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000ec0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000300)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000000c0)='filter\x00', 0x0) 11:14:34 executing program 4: truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:14:35 executing program 4: truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:14:37 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) ioperm(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000480)) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:14:37 executing program 4: truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:14:37 executing program 0: getpgid(0xffffffffffffffff) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) getpid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)) getpgid(0x0) getpid() getpgid(0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d40)="428055a0376969b8ef69dc364141aa3223333342738504750000c4412c5497995100002edff248c4c37d19711212c19086d962788f197a076479fb97fb976e839800ba000079aa66daa50000000066a1430f5534c12d0a0000000000a11b00000031a314b7065a0f44f1442904") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000002c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'veth0_to_bond\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000a40)=0xe8) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001140)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast1, @rand_addr}, &(0x7f00000011c0)=0xc) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001000)={0x0, @multicast2, @broadcast}, &(0x7f0000001040)=0xc) 11:14:37 executing program 3: uname(&(0x7f0000000040)=""/109) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) clock_gettime(0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000640)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000680), 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) pipe(&(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'veth0_to_bridge\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000ec0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000300)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000000c0)='filter\x00', 0x0) 11:14:37 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000940)={0x0, &(0x7f00000008c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) syz_open_dev$loop(&(0x7f0000000a40)='/dev/loop#\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa6, 0x7d, 0x0, {{0x0, 0x80, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, 'loselinux-', 0x19, 'system.posix_acl_default\x00', 0x19, 'system.posix_acl_default\x00', 0x11, '/selinux/relabel\x00'}, 0x11, '/selinux/relabel\x00'}}, 0xa6) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000b40)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000900)={@remote, @remote}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/relabel\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000008c0)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000700)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) 11:14:37 executing program 5: syslog(0xa, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000002c0)={0x28}, 0x28) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001ec0)={'syz_tun\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002200)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:14:37 executing program 4: truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:14:37 executing program 4: mmap(&(0x7f0000000000/0xa73000)=nil, 0xa73000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x30, &(0x7f0000000000)={0x0, 0x0, 0x6fffe}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000a72000)={0x0, 0x1c9c380}, 0x8) 11:14:37 executing program 4: mmap(&(0x7f0000000000/0xa73000)=nil, 0xa73000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x30, &(0x7f0000000000)={0x0, 0x0, 0x6fffe}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000a72000)={0x0, 0x1c9c380}, 0x8) 11:14:37 executing program 4: mmap(&(0x7f0000000000/0xa73000)=nil, 0xa73000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x30, &(0x7f0000000000)={0x0, 0x0, 0x6fffe}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000a72000)={0x0, 0x1c9c380}, 0x8) 11:14:37 executing program 4: mmap(&(0x7f0000000000/0xa73000)=nil, 0xa73000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x30, &(0x7f0000000000)={0x0, 0x0, 0x6fffe}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000a72000)={0x0, 0x1c9c380}, 0x8) 11:14:37 executing program 4: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) fstat(0xffffffffffffffff, &(0x7f0000005000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) getresgid(&(0x7f0000006700), &(0x7f0000006740), &(0x7f0000006780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000067c0)) stat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) lstat(&(0x7f00000068c0)='./file0\x00', &(0x7f0000006900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006980)) lstat(&(0x7f00000069c0)='./file0\x00', &(0x7f0000006a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c40)=0xe8) getresgid(&(0x7f0000006c80), &(0x7f0000006cc0), &(0x7f0000006d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) timerfd_create(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000c80)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000cc0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00', 0x37, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d36ff4)) fcntl$getflags(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000bc0)=0xe8) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180), 0x10) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 11:14:43 executing program 1: ioperm(0x0, 0xb2c0, 0x200000004000) open(&(0x7f0000000a40)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000ac0)='nbd\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) creat(&(0x7f0000000b80)='./file1\x00', 0x0) pipe2(&(0x7f0000000bc0), 0x0) accept(0xffffffffffffff9c, &(0x7f0000000c00)=@un=@abs, &(0x7f0000000c80)=0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/mls\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000dc0)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006240)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000006380)={&(0x7f0000000a80), 0xc, &(0x7f0000006340)={&(0x7f0000000ec0)={0x14}, 0x14}}, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) eventfd2(0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a40)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000000600)=@hci, &(0x7f0000000680)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}}}, &(0x7f00000007c0)=0xe8) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000200), 0xc, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[]}}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000500)=0x4) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000004c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) dup(0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000fc0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 11:14:43 executing program 3: uname(&(0x7f0000000040)=""/109) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) clock_gettime(0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000640)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000680), 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) pipe(&(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'veth0_to_bridge\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000ec0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000300)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000000c0)='filter\x00', 0x0) 11:14:45 executing program 0: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:14:45 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000940)={0x0, &(0x7f00000008c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) syz_open_dev$loop(&(0x7f0000000a40)='/dev/loop#\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa6, 0x7d, 0x0, {{0x0, 0x80, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, 'loselinux-', 0x19, 'system.posix_acl_default\x00', 0x19, 'system.posix_acl_default\x00', 0x11, '/selinux/relabel\x00'}, 0x11, '/selinux/relabel\x00'}}, 0xa6) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000b40)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000900)={@remote, @remote}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/relabel\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000008c0)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000700)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) 11:14:45 executing program 4: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) fstat(0xffffffffffffffff, &(0x7f0000005000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) getresgid(&(0x7f0000006700), &(0x7f0000006740), &(0x7f0000006780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000067c0)) stat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) lstat(&(0x7f00000068c0)='./file0\x00', &(0x7f0000006900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006980)) lstat(&(0x7f00000069c0)='./file0\x00', &(0x7f0000006a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c40)=0xe8) getresgid(&(0x7f0000006c80), &(0x7f0000006cc0), &(0x7f0000006d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) timerfd_create(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000c80)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000cc0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00', 0x37, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d36ff4)) fcntl$getflags(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000bc0)=0xe8) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180), 0x10) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 11:14:45 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) 11:14:45 executing program 5: clock_gettime(0x7, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000009c0)='syz1\x00') 11:14:46 executing program 4: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) fstat(0xffffffffffffffff, &(0x7f0000005000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) getresgid(&(0x7f0000006700), &(0x7f0000006740), &(0x7f0000006780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000067c0)) stat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) lstat(&(0x7f00000068c0)='./file0\x00', &(0x7f0000006900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006980)) lstat(&(0x7f00000069c0)='./file0\x00', &(0x7f0000006a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c40)=0xe8) getresgid(&(0x7f0000006c80), &(0x7f0000006cc0), &(0x7f0000006d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) timerfd_create(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000c80)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000cc0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00', 0x37, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d36ff4)) fcntl$getflags(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000bc0)=0xe8) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180), 0x10) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 11:14:46 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000940)={0x0, &(0x7f00000008c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) syz_open_dev$loop(&(0x7f0000000a40)='/dev/loop#\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa6, 0x7d, 0x0, {{0x0, 0x80, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, 'loselinux-', 0x19, 'system.posix_acl_default\x00', 0x19, 'system.posix_acl_default\x00', 0x11, '/selinux/relabel\x00'}, 0x11, '/selinux/relabel\x00'}}, 0xa6) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000b40)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000900)={@remote, @remote}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/relabel\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000008c0)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000700)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) 11:14:46 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) 11:14:47 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000940)={0x0, &(0x7f00000008c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getegid() getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) syz_open_dev$loop(&(0x7f0000000a40)='/dev/loop#\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000980)={0xa6, 0x7d, 0x0, {{0x0, 0x80, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, 'loselinux-', 0x19, 'system.posix_acl_default\x00', 0x19, 'system.posix_acl_default\x00', 0x11, '/selinux/relabel\x00'}, 0x11, '/selinux/relabel\x00'}}, 0xa6) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000b40)=""/99) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000900)={@remote, @remote}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/relabel\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000880)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000008c0)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000700)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) 11:14:47 executing program 4: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) fstat(0xffffffffffffffff, &(0x7f0000005000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) getresgid(&(0x7f0000006700), &(0x7f0000006740), &(0x7f0000006780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000067c0)) stat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) lstat(&(0x7f00000068c0)='./file0\x00', &(0x7f0000006900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006980)) lstat(&(0x7f00000069c0)='./file0\x00', &(0x7f0000006a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c40)=0xe8) getresgid(&(0x7f0000006c80), &(0x7f0000006cc0), &(0x7f0000006d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) timerfd_create(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000c80)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000cc0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00', 0x37, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d36ff4)) fcntl$getflags(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00001d9ff4)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000bc0)=0xe8) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180), 0x10) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 11:14:51 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000680)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000640)=0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000700), &(0x7f0000000300)}}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f0000000280)) socket(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 11:14:51 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) 11:14:53 executing program 0: socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840)) stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0)) getgroups(0x0, &(0x7f0000002940)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getgroups(0x0, &(0x7f0000002c40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) gettid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getgroups(0x0, &(0x7f00000004c0)) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 11:14:53 executing program 2: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000780), &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003d80), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e80)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f0000003f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:14:53 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x32c, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) timerfd_create(0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@remote, @multicast1}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @remote, @broadcast}, &(0x7f00000007c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000001040)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000800)={@rand_addr, @multicast2}, &(0x7f0000000840)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000880)={@dev}, &(0x7f00000008c0)=0x14) 11:14:53 executing program 4: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:53 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) 11:14:54 executing program 2: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000780), &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003d80), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e80)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f0000003f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:14:54 executing program 4: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:54 executing program 4: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:54 executing program 2: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000780), &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003d80), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e80)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f0000003f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:14:54 executing program 4: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:14:57 executing program 4: getrusage(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dcc45242159ef7f70f3a608600088041cb913591913d062900770f78993d233d23410feefa1b660f3a1658fea0c401f9f7cdbae5e5e575f6f6263828c44379dfb9d6adbe90dfe2989f7f") timerfd_create(0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000140)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000380)) setitimer(0x0, &(0x7f00000003c0)={{}, {0x77359400}}, &(0x7f0000000400)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f0000000300)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000004c0)) utimensat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 11:14:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') lseek(r1, 0x16, 0x0) 11:15:00 executing program 0: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='#! \t'], 0x4) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400), &(0x7f0000000140)) 11:15:00 executing program 2: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000780), &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)={@loopback, @multicast1}, &(0x7f0000000e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @remote}, &(0x7f0000001040)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003d80), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e80)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@remote}}}, &(0x7f0000003f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004240)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004340)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000240), 0xc, &(0x7f00000046c0)={&(0x7f0000004780)=ANY=[]}}, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0xffffffffffffff0a, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0xe8) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 11:15:00 executing program 3: remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) 11:15:00 executing program 4: getrusage(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dcc45242159ef7f70f3a608600088041cb913591913d062900770f78993d233d23410feefa1b660f3a1658fea0c401f9f7cdbae5e5e575f6f6263828c44379dfb9d6adbe90dfe2989f7f") timerfd_create(0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000140)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000380)) setitimer(0x0, &(0x7f00000003c0)={{}, {0x77359400}}, &(0x7f0000000400)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f0000000300)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000004c0)) utimensat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 11:15:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') lseek(r1, 0x16, 0x0) 11:15:00 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='bdev\x00'}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000300)=0xffcc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x40000000000000c9, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) lstat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000050c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005200)=0xe8) lstat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) getpgrp(0xffffffffffffffff) geteuid() stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca36672e2e3664470f8a4fc20000dae5e5417545b00f2e1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:01 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:01 executing program 4: getrusage(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dcc45242159ef7f70f3a608600088041cb913591913d062900770f78993d233d23410feefa1b660f3a1658fea0c401f9f7cdbae5e5e575f6f6263828c44379dfb9d6adbe90dfe2989f7f") timerfd_create(0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000140)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000380)) setitimer(0x0, &(0x7f00000003c0)={{}, {0x77359400}}, &(0x7f0000000400)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f0000000300)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000004c0)) utimensat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 11:15:01 executing program 3: remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) 11:15:01 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:02 executing program 3: remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) 11:15:02 executing program 4: getrusage(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dcc45242159ef7f70f3a608600088041cb913591913d062900770f78993d233d23410feefa1b660f3a1658fea0c401f9f7cdbae5e5e575f6f6263828c44379dfb9d6adbe90dfe2989f7f") timerfd_create(0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000140)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000380)) setitimer(0x0, &(0x7f00000003c0)={{}, {0x77359400}}, &(0x7f0000000400)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f0000000300)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000004c0)) utimensat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={{0x77359400}}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 11:15:03 executing program 0: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='#! \t'], 0x4) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400), &(0x7f0000000140)) 11:15:03 executing program 3: remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000040)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) 11:15:03 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) 11:15:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') lseek(r1, 0x16, 0x0) 11:15:04 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='bdev\x00'}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000300)=0xffcc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x40000000000000c9, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) lstat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000050c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005200)=0xe8) lstat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) getpgrp(0xffffffffffffffff) geteuid() stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca36672e2e3664470f8a4fc20000dae5e5417545b00f2e1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) 11:15:04 executing program 2: unlink(&(0x7f00000004c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:04 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001500), 0x14) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:04 executing program 0: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='#! \t'], 0x4) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400), &(0x7f0000000140)) 11:15:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') lseek(r1, 0x16, 0x0) 11:15:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) 11:15:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) 11:15:04 executing program 4: getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getuid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) stat(0x0, &(0x7f0000000e80)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgroups(0x0, &(0x7f0000000fc0)) 11:15:04 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001500), 0x14) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:04 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001500), 0x14) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:04 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001500), 0x14) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:11 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='bdev\x00'}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000300)=0xffcc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x40000000000000c9, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) lstat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000050c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005200)=0xe8) lstat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) getpgrp(0xffffffffffffffff) geteuid() stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca36672e2e3664470f8a4fc20000dae5e5417545b00f2e1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:11 executing program 3: ustat(0x0, &(0x7f0000000300)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000400), 0x88) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/91) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000003c0)='y\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) poll(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) 11:15:11 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000b40), &(0x7f0000000440), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0xfffffeb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000740)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 11:15:11 executing program 4: getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getuid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) stat(0x0, &(0x7f0000000e80)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgroups(0x0, &(0x7f0000000fc0)) 11:15:11 executing program 1: clock_nanosleep(0xffc99a3c, 0x0, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000380)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000640), 0x0, &(0x7f0000000540), &(0x7f0000000680), 0xffffffbd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) 11:15:11 executing program 0: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='#! \t'], 0x4) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400), &(0x7f0000000140)) 11:15:11 executing program 4: getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getuid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) stat(0x0, &(0x7f0000000e80)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgroups(0x0, &(0x7f0000000fc0)) 11:15:11 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000b40), &(0x7f0000000440), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0xfffffeb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000740)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 11:15:12 executing program 3: ustat(0x0, &(0x7f0000000300)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000400), 0x88) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/91) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000003c0)='y\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) poll(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) 11:15:12 executing program 4: getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getuid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) stat(0x0, &(0x7f0000000e80)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgroups(0x0, &(0x7f0000000fc0)) 11:15:12 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000b40), &(0x7f0000000440), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0xfffffeb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000740)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 11:15:12 executing program 3: ustat(0x0, &(0x7f0000000300)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000400), 0x88) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/91) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000003c0)='y\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) poll(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) 11:15:19 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000b40), &(0x7f0000000440), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0xfffffeb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000740)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 11:15:19 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='bdev\x00'}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000300)=0xffcc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x40000000000000c9, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) lstat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000050c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005200)=0xe8) lstat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) getpgrp(0xffffffffffffffff) geteuid() stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca36672e2e3664470f8a4fc20000dae5e5417545b00f2e1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:19 executing program 3: ustat(0x0, &(0x7f0000000300)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000400), 0x88) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000180)=""/91) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000003c0)='y\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) poll(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) 11:15:19 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) clock_gettime(0x0, &(0x7f0000000580)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000440)) getpid() socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000b40)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) uname(&(0x7f0000000c80)=""/194) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000002c0)=""/41) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 11:15:19 executing program 1: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240), 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/22) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000002c0)="428055a061e9d92a5c411837370f38211af20f2d55004e2179fbe5f54175455de0932ebc2ebc0d64ac1e4529b000000000cf7f") 11:15:19 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) write$selinux_load(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={'bond0\x00', {0x2, 0x0, @dev}}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000003c0)={'TPROXY\x00'}, &(0x7f0000000480)=0x1e) memfd_create(&(0x7f0000000200), 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/user\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@loopback, @in6}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001740)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getgroups(0x0, &(0x7f00000035c0)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003600)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000003700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003740)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000038c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003900), &(0x7f0000003940)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003d00)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) getgroups(0x0, &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e80), &(0x7f0000003ec0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f00)={{{@in6=@loopback, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) gettid() geteuid() getegid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004180), &(0x7f00000041c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006f40)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:15:20 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "b5e51bcafdfd24c432c7a5b15ec61351"}, 0x15, 0x0) dup(0xffffffffffffff9c) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast2, @multicast2}, &(0x7f0000000500)=0xc) 11:15:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c04, 0xffffffffffffffff) fstat(r0, &(0x7f0000000240)) 11:15:20 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) clock_gettime(0x0, &(0x7f0000000580)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000440)) getpid() socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000b40)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) uname(&(0x7f0000000c80)=""/194) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000002c0)=""/41) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 11:15:20 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "b5e51bcafdfd24c432c7a5b15ec61351"}, 0x15, 0x0) dup(0xffffffffffffff9c) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast2, @multicast2}, &(0x7f0000000500)=0xc) 11:15:20 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) clock_gettime(0x0, &(0x7f0000000580)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000440)) getpid() socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000b40)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) uname(&(0x7f0000000c80)=""/194) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000002c0)=""/41) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 11:15:21 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "b5e51bcafdfd24c432c7a5b15ec61351"}, 0x15, 0x0) dup(0xffffffffffffff9c) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast2, @multicast2}, &(0x7f0000000500)=0xc) 11:15:21 executing program 4: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) clock_gettime(0x0, &(0x7f0000000580)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000440)) getpid() socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000b40)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) uname(&(0x7f0000000c80)=""/194) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000002c0)=""/41) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 11:15:28 executing program 0: umount2(&(0x7f0000000200)='./file0/file0\x00', 0xfffffffffffffffe) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:28 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 11:15:28 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "b5e51bcafdfd24c432c7a5b15ec61351"}, 0x15, 0x0) dup(0xffffffffffffff9c) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast2, @multicast2}, &(0x7f0000000500)=0xc) 11:15:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c04, 0xffffffffffffffff) fstat(r0, &(0x7f0000000240)) 11:15:28 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x7) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b80)=0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={@local, @broadcast}, &(0x7f00000004c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002580)={{{@in=@remote, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002680)=0xe8) bind(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000026c0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000027c0)=0xe8) 11:15:28 executing program 5: inotify_init1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:15:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet(0x2, 0x200000000002, 0x0) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) recvmmsg(r2, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 11:15:29 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 11:15:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet(0x2, 0x200000000002, 0x0) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) recvmmsg(r2, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 11:15:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet(0x2, 0x200000000002, 0x0) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) recvmmsg(r2, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 11:15:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet(0x2, 0x200000000002, 0x0) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) recvmmsg(r2, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 11:15:29 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 11:15:34 executing program 0: umount2(&(0x7f0000000200)='./file0/file0\x00', 0xfffffffffffffffe) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:34 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 11:15:34 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 11:15:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c04, 0xffffffffffffffff) fstat(r0, &(0x7f0000000240)) 11:15:35 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/195, &(0x7f00000002c0)=0x2ae) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) 11:15:36 executing program 5: epoll_create(0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) sched_setparam(0x0, &(0x7f00000002c0)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 11:15:36 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 11:15:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c04, 0xffffffffffffffff) fstat(r0, &(0x7f0000000240)) 11:15:36 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 11:15:36 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 11:15:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0, &(0x7f00000009c0)={0x77359400}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:37 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000380)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f00000002c0)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000f00)=0xe8) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@local, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) geteuid() getgroups(0x0, &(0x7f0000001540)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgroups(0x0, &(0x7f0000001640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001680)=')^\x00'}, 0x30) getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getpid() fstat(0xffffffffffffffff, &(0x7f0000001880)) stat(&(0x7f0000001900)='./file1\x00', &(0x7f0000000480)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:40 executing program 0: umount2(&(0x7f0000000200)='./file0/file0\x00', 0xfffffffffffffffe) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0, &(0x7f00000009c0)={0x77359400}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000380)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f00000002c0)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000f00)=0xe8) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@local, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) geteuid() getgroups(0x0, &(0x7f0000001540)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgroups(0x0, &(0x7f0000001640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001680)=')^\x00'}, 0x30) getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getpid() fstat(0xffffffffffffffff, &(0x7f0000001880)) stat(&(0x7f0000001900)='./file1\x00', &(0x7f0000000480)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:40 executing program 3: memfd_create(&(0x7f0000000340)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000fc0)={'bridge_slave_1\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0, &(0x7f0000003a80)={0x0, 0x989680}) recvmsg(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000003ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003d00), 0x0, &(0x7f0000003d40)=""/237, 0xed}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @loopback}, &(0x7f0000007380)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000073c0)={'veth0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a600)={{{@in=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f000000a700)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a780)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a7c0)={{{@in=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000a8c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a900)={'team_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000a940), &(0x7f000000a980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000aa00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000adc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ae00)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1}}, {{@in6}}}, &(0x7f000000af00)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000b500)={&(0x7f0000000400), 0xc, &(0x7f000000b4c0)={&(0x7f000000af40)=ANY=[]}}, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@remote, @broadcast}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) seccomp(0x0, 0x0, &(0x7f0000000100)) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 11:15:42 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/195, &(0x7f00000002c0)=0x2ae) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) 11:15:43 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) r2 = accept$inet(r1, 0x0, &(0x7f00000004c0)) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000000)=""/41, &(0x7f0000000040)=0x29) 11:15:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/234) close(0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000340)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ac0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@can, &(0x7f0000000b80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0xfffffffffffffebc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@rand_addr, @broadcast}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast1}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000019c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@dev, @broadcast}, &(0x7f0000001d80)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:15:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0, &(0x7f00000009c0)={0x77359400}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000380)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f00000002c0)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000f00)=0xe8) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@local, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) geteuid() getgroups(0x0, &(0x7f0000001540)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgroups(0x0, &(0x7f0000001640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001680)=')^\x00'}, 0x30) getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getpid() fstat(0xffffffffffffffff, &(0x7f0000001880)) stat(&(0x7f0000001900)='./file1\x00', &(0x7f0000000480)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/234) close(0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000340)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ac0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@can, &(0x7f0000000b80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0xfffffffffffffebc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@rand_addr, @broadcast}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast1}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000019c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@dev, @broadcast}, &(0x7f0000001d80)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:15:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/234) close(0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000340)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ac0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@can, &(0x7f0000000b80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0xfffffffffffffebc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@rand_addr, @broadcast}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast1}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000019c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@dev, @broadcast}, &(0x7f0000001d80)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:15:43 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/234) close(0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000340)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ac0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@can, &(0x7f0000000b80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0xfffffffffffffebc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@rand_addr, @broadcast}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast1}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000019c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@dev, @broadcast}, &(0x7f0000001d80)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:15:48 executing program 0: umount2(&(0x7f0000000200)='./file0/file0\x00', 0xfffffffffffffffe) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:15:48 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000001bc0)={0x77359400}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[]}}, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$selinux_user(0xffffffffffffffff, &(0x7f00000007c0)={'system_u:object_r:gpg_agent_exec_t:s0', 0x20, 'user_u\x00'}, 0x2d) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:15:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0, &(0x7f00000009c0)={0x77359400}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:48 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000380)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f00000002c0)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000f00)=0xe8) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@local, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) geteuid() getgroups(0x0, &(0x7f0000001540)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgroups(0x0, &(0x7f0000001640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001680)=')^\x00'}, 0x30) getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getpid() fstat(0xffffffffffffffff, &(0x7f0000001880)) stat(&(0x7f0000001900)='./file1\x00', &(0x7f0000000480)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:15:50 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/195, &(0x7f00000002c0)=0x2ae) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) 11:15:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) r2 = accept$inet(r1, 0x0, &(0x7f00000004c0)) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000000)=""/41, &(0x7f0000000040)=0x29) 11:15:50 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000001bc0)={0x77359400}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[]}}, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$selinux_user(0xffffffffffffffff, &(0x7f00000007c0)={'system_u:object_r:gpg_agent_exec_t:s0', 0x20, 'user_u\x00'}, 0x2d) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:15:50 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 11:15:50 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() 11:15:51 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000001bc0)={0x77359400}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[]}}, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$selinux_user(0xffffffffffffffff, &(0x7f00000007c0)={'system_u:object_r:gpg_agent_exec_t:s0', 0x20, 'user_u\x00'}, 0x2d) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:15:51 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 11:15:51 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 11:15:54 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) r2 = accept$inet(r1, 0x0, &(0x7f00000004c0)) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000000)=""/41, &(0x7f0000000040)=0x29) 11:15:54 executing program 4: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 11:15:54 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000001bc0)={0x77359400}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[]}}, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$selinux_user(0xffffffffffffffff, &(0x7f00000007c0)={'system_u:object_r:gpg_agent_exec_t:s0', 0x20, 'user_u\x00'}, 0x2d) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:15:54 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() 11:15:57 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/195, &(0x7f00000002c0)=0x2ae) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) 11:15:57 executing program 0: clock_gettime(0x5, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000340)) exit_group(0x0) 11:15:57 executing program 4: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:15:57 executing program 3: clock_settime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 11:15:57 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() 11:15:57 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) r2 = accept$inet(r1, 0x0, &(0x7f00000004c0)) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000000)=""/41, &(0x7f0000000040)=0x29) 11:15:58 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) sched_rr_get_interval(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() 11:15:58 executing program 3: clock_settime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 11:15:58 executing program 4: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:15:59 executing program 2: socket$inet6(0xa, 0x80001, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 11:15:59 executing program 3: clock_settime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 11:15:59 executing program 4: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:04 executing program 4: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:04 executing program 3: clock_settime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 11:16:04 executing program 2: socket$inet6(0xa, 0x80001, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 11:16:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000180)=[{r1}], 0x20000000000000a9, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 11:16:04 executing program 0: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:16:04 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') mmap(&(0x7f0000018000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000180)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) geteuid() getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000680)) syz_open_procfs(0x0, &(0x7f0000000b40)='net/raw6\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) 11:16:05 executing program 2: socket$inet6(0xa, 0x80001, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 11:16:05 executing program 3: readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000b40)=""/119, 0xfffffffffffffe65) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000004080)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getcwd(&(0x7f0000000340)=""/9, 0x9) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000200), 0x4) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) clock_getres(0x0, &(0x7f0000000140)) gettid() rt_sigprocmask(0x0, &(0x7f00000003c0), &(0x7f0000000500), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000ec0)={'bcsh0\x00'}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 11:16:05 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)=')vboxnet1userlosystem\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:06 executing program 3: inotify_init1(0x0) eventfd(0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000780)='cpuset\x00') 11:16:06 executing program 2: socket$inet6(0xa, 0x80001, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 11:16:06 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)=')vboxnet1userlosystem\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:07 executing program 3: inotify_init1(0x0) eventfd(0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000780)='cpuset\x00') 11:16:07 executing program 2: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) pread64(0xffffffffffffffff, &(0x7f0000000680)=""/4096, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900)}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000009c0)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000380)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=""/248, 0xf8}) pipe2(&(0x7f0000000400), 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000700)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 11:16:07 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)=')vboxnet1userlosystem\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:08 executing program 5: prctl$setname(0xf, &(0x7f0000000240)="6b657972696e6773656c696e75782d005744b086a239d22d746d31080ecd297596f34804f033ef0782473b26961e374d862edfefb85379c4c9524a2ddac5138e257c2d3de5e31da8b150f06f8d19673ebac6480dbf08c8ec837c93dd981e8a6e274ffbf9b9e7f0a313e58aff661c1b1f272be9ffe11b95999a0872683599ff03db40c79d9f7965b1fd0df9d140c99ac8b7f17baf06ef04183b5972bfeef0509dddecdb170c7a4dee4581462589903039a806ac105478dbcaf6c2d772f930d212a2d1e3a9f0d6f4") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000080)) 11:16:13 executing program 3: inotify_init1(0x0) eventfd(0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000780)='cpuset\x00') 11:16:15 executing program 1: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000400)='/dev/keychord\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000380)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") accept4(0xffffffffffffffff, &(0x7f00000001c0)=@can, &(0x7f0000000140)=0x80, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000440)=0x80) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000180)) personality(0x0) 11:16:15 executing program 0: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:16:15 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)=')vboxnet1userlosystem\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:15 executing program 2: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) pread64(0xffffffffffffffff, &(0x7f0000000680)=""/4096, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900)}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000009c0)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000380)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=""/248, 0xf8}) pipe2(&(0x7f0000000400), 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000700)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 11:16:15 executing program 3: inotify_init1(0x0) eventfd(0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) memfd_create(&(0x7f0000000400)='\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket$inet(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000780)='cpuset\x00') 11:16:15 executing program 5: socket$packet(0x11, 0x3, 0x300) accept(0xffffffffffffffff, &(0x7f0000000480)=@generic, &(0x7f0000000200)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000001c0)="da5e00") preadv(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001dc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001f00)=0xe8) lstat(&(0x7f0000001f40)='./file1\x00', &(0x7f0000001f80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000002040)=0xc) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002080)) lstat(&(0x7f00000020c0)='./file1\x00', &(0x7f0000002100)) getegid() getpgrp(0xffffffffffffffff) geteuid() getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005ac0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005c00)=0xffffffffffffff80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c40), &(0x7f0000005c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000005e00)=0xe8) lstat(&(0x7f0000005e40)='./file0\x00', &(0x7f0000005e80)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000005f00)='./file0\x00', &(0x7f0000005f40)) accept$inet(0xffffffffffffffff, &(0x7f0000006140)={0x2, 0x0, @multicast1}, &(0x7f0000006180)=0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000007740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007780), &(0x7f00000077c0)=0xc) lstat(&(0x7f0000007800)='./file0\x00', &(0x7f0000007840)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000078c0)) getresuid(&(0x7f0000007900), &(0x7f0000007940), &(0x7f0000007980)) fstat(0xffffffffffffffff, &(0x7f0000000680)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007a80)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000007b80)=0xe8) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007bc0)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000007cc0)=0xe8) 11:16:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) getpid() fstat(0xffffffffffffffff, &(0x7f0000001b40)) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003300)) getuid() getgroups(0x0, &(0x7f0000003340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000034c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000038c0)) geteuid() getgid() getpgrp(0x0) geteuid() getegid() getpid() lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getgroups(0x0, &(0x7f00000039c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getresuid(&(0x7f0000003cc0), &(0x7f0000003d00), &(0x7f0000003d40)) fstat(0xffffffffffffffff, &(0x7f0000003d80)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003f00)=0xe8) getresgid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) setpgid(0x0, 0x0) 11:16:15 executing program 3: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:15 executing program 2: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) pread64(0xffffffffffffffff, &(0x7f0000000680)=""/4096, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900)}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000009c0)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000380)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=""/248, 0xf8}) pipe2(&(0x7f0000000400), 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000700)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 11:16:16 executing program 3: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:16 executing program 2: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) pread64(0xffffffffffffffff, &(0x7f0000000680)=""/4096, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900)}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000009c0)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000380)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=""/248, 0xf8}) pipe2(&(0x7f0000000400), 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000700)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 11:16:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) getpid() fstat(0xffffffffffffffff, &(0x7f0000001b40)) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003300)) getuid() getgroups(0x0, &(0x7f0000003340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000034c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000038c0)) geteuid() getgid() getpgrp(0x0) geteuid() getegid() getpid() lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getgroups(0x0, &(0x7f00000039c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getresuid(&(0x7f0000003cc0), &(0x7f0000003d00), &(0x7f0000003d40)) fstat(0xffffffffffffffff, &(0x7f0000003d80)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003f00)=0xe8) getresgid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) setpgid(0x0, 0x0) 11:16:18 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pause() tkill(r0, 0x1000000000016) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 11:16:20 executing program 0: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:16:20 executing program 3: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:20 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) getpid() fstat(0xffffffffffffffff, &(0x7f0000001b40)) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003300)) getuid() getgroups(0x0, &(0x7f0000003340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000034c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000038c0)) geteuid() getgid() getpgrp(0x0) geteuid() getegid() getpid() lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getgroups(0x0, &(0x7f00000039c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getresuid(&(0x7f0000003cc0), &(0x7f0000003d00), &(0x7f0000003d40)) fstat(0xffffffffffffffff, &(0x7f0000003d80)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003f00)=0xe8) getresgid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) setpgid(0x0, 0x0) 11:16:20 executing program 5: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:20 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pause() tkill(r0, 0x1000000000016) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 11:16:21 executing program 3: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:21 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) getpid() fstat(0xffffffffffffffff, &(0x7f0000001b40)) lstat(&(0x7f0000001bc0)='./file1\x00', &(0x7f0000001c00)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003300)) getuid() getgroups(0x0, &(0x7f0000003340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000034c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000038c0)) geteuid() getgid() getpgrp(0x0) geteuid() getegid() getpid() lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getgroups(0x0, &(0x7f00000039c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getresuid(&(0x7f0000003cc0), &(0x7f0000003d00), &(0x7f0000003d40)) fstat(0xffffffffffffffff, &(0x7f0000003d80)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003f00)=0xe8) getresgid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) setpgid(0x0, 0x0) 11:16:21 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pause() tkill(r0, 0x1000000000016) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 11:16:21 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:21 executing program 3: clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) openat$zero(0xffffffffffffff9c, &(0x7f0000002900)='/dev/zero\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)) dup(0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 11:16:24 executing program 0: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:16:24 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)="00001000e158") exit(0x0) getdents64(r1, &(0x7f0000000340)=""/57, 0x39) 11:16:24 executing program 3: clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) openat$zero(0xffffffffffffff9c, &(0x7f0000002900)='/dev/zero\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)) dup(0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 11:16:24 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pause() tkill(r0, 0x1000000000016) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 11:16:26 executing program 5: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:26 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) syz_execute_func(&(0x7f00000005c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38218f0a4812057b070000feeffffff0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac401a864ac1e4d31a3b74472e671fb0703") 11:16:26 executing program 3: clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) openat$zero(0xffffffffffffff9c, &(0x7f0000002900)='/dev/zero\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)) dup(0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 11:16:26 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)="00001000e158") exit(0x0) getdents64(r1, &(0x7f0000000340)=""/57, 0x39) 11:16:26 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) getpgid(0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/keychord\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000640)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000540)=0x80, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000880)=""/210, 0x1a, 0xd2}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000b80)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/uinput\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/enforce\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ashmem\x00', 0x0, 0x0) eventfd2(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001200)='/dev/vga_arbiter\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001240)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000012c0)=0x80, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001300)='/dev/ashmem\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001340)='oom_score\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000001380)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/context\x00', 0x2, 0x0) set_tid_address(&(0x7f0000000040)) lookup_dcookie(0x0, &(0x7f0000000380)=""/92, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) chdir(&(0x7f0000000180)='./file0\x00') syz_execute_func(&(0x7f0000000740)="428055a02e9d800bf2e37d0fe1ff6920375137ffc3c3392a8e0f93754064a736260fae7a00400f01efe5afe57545800e2e1a1ac4810ddd1901eec46219b9d68100000000002e6426f30f2b0509000000f9") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001180)='threaded\x00', 0xfc9a) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000580)="3766ec7a537bd57a445cfb394a97285b", 0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 11:16:27 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)="00001000e158") exit(0x0) getdents64(r1, &(0x7f0000000340)=""/57, 0x39) 11:16:27 executing program 3: clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) openat$zero(0xffffffffffffff9c, &(0x7f0000002900)='/dev/zero\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)) dup(0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 11:16:27 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) syz_execute_func(&(0x7f00000005c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38218f0a4812057b070000feeffffff0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac401a864ac1e4d31a3b74472e671fb0703") 11:16:28 executing program 0: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:16:28 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)="00001000e158") exit(0x0) getdents64(r1, &(0x7f0000000340)=""/57, 0x39) 11:16:28 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) syz_execute_func(&(0x7f00000005c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38218f0a4812057b070000feeffffff0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac401a864ac1e4d31a3b74472e671fb0703") 11:16:28 executing program 3: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000200)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:16:29 executing program 5: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000500)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000019d5e4a4bb9c41a1aab000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) set_tid_address(&(0x7f0000000000)) accept(r0, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) 11:16:29 executing program 4: clock_gettime(0x3, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000000180)='IPVS\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 11:16:29 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) syz_execute_func(&(0x7f00000005c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38218f0a4812057b070000feeffffff0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac401a864ac1e4d31a3b74472e671fb0703") 11:16:29 executing program 3: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000200)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:16:29 executing program 1: getrlimit(0x0, &(0x7f0000000140)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffff9c, &(0x7f0000000300)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000580)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) memfd_create(&(0x7f0000000480)='bdev\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$urandom(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000700)='\x00'}, 0x2ab) pipe2(&(0x7f0000000840), 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000880)='cpuset.cpus\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ppp\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) lstat(&(0x7f0000000900)='./file1\x00', &(0x7f0000000940)) fstat(0xffffffffffffff9c, &(0x7f00000009c0)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/uinput\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000a80)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ac0), 0x4) signalfd(0xffffffffffffffff, &(0x7f0000000b00), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='bdev\x00'}, 0x10) creat(&(0x7f0000000bc0)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/full\x00', 0x0, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000d40)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/enforce\x00', 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000dc0)=@rc, &(0x7f0000000e40)=0x80) socketpair(0x0, 0x0, 0x0, &(0x7f0000000e80)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000ec0)) inotify_init() socket$inet6(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000002180)) accept4$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002240)='memory.high\x00', 0x2, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002280)='/dev/keychord\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000022c0)='/selinux/load\x00', 0x2, 0x0) memfd_create(&(0x7f0000002300)='bdev\x00', 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000002340)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002380)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000023c0)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) gettid() lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002cc0), 0x0, 0x0) mount(&(0x7f0000000500)=@nbd={'/dev/nbd'}, &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 11:16:30 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) pipe(&(0x7f0000000600)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0x9) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000680)) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000003c0), &(0x7f0000000900), &(0x7f0000000880)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000940)="428055a0876969ef69dc00d9c423fbf066110841ff0f1837370f593c211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:30 executing program 3: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000200)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:16:30 executing program 4: clock_gettime(0x3, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000000180)='IPVS\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 11:16:35 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) pipe(&(0x7f0000000600)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0x9) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000680)) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000003c0), &(0x7f0000000900), &(0x7f0000000880)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000940)="428055a0876969ef69dc00d9c423fbf066110841ff0f1837370f593c211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:35 executing program 3: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000200)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 11:16:35 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getegid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:35 executing program 4: clock_gettime(0x3, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000000180)='IPVS\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 11:16:36 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) pipe(&(0x7f0000000600)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0x9) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000680)) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000003c0), &(0x7f0000000900), &(0x7f0000000880)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000940)="428055a0876969ef69dc00d9c423fbf066110841ff0f1837370f593c211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:36 executing program 4: clock_gettime(0x3, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000000180)='IPVS\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 11:16:36 executing program 3: inotify_init() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000300)=0x24) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/116, 0x74, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:36 executing program 5: memfd_create(&(0x7f0000000040)='\x00', 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpid() getuid() gettid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000001840)=ANY=[], &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) getpid() geteuid() getgroups(0x0, &(0x7f00000005c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa37b90f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") 11:16:38 executing program 1: eventfd2(0x0, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getaffinity(0x0, 0x8, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in6, @in=@multicast2}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000f80)=0xe8) getresgid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in=@remote, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000001400)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001440)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getgid() stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getegid() syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a9af6eeba39290f38c4827d20c9fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:38 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) pipe(&(0x7f0000000600)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0x9) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000680)) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000003c0), &(0x7f0000000900), &(0x7f0000000880)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000940)="428055a0876969ef69dc00d9c423fbf066110841ff0f1837370f593c211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 11:16:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x100000001) 11:16:38 executing program 3: inotify_init() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000300)=0x24) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/116, 0x74, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x100000001) 11:16:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x100000001) 11:16:43 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003b40)='/dev/vga_arbiter\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 11:16:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x100000001) 11:16:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:43 executing program 3: inotify_init() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000300)=0x24) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/116, 0x74, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:16:44 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='trusted:\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@dev}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'bond0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240), 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) 11:16:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:16:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:44 executing program 3: inotify_init() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000300)=0x24) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/116, 0x74, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 11:16:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:16:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:16:45 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f0000000640)="6367726f75702e74687e65c7df4d62", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 11:16:45 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) capget(&(0x7f0000000000), &(0x7f0000000080)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000380)=ANY=[], 0x0) 11:16:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:45 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) clock_gettime(0x0, &(0x7f00000002c0)) socket$packet(0x11, 0x0, 0x300) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() 11:16:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:46 executing program 5: gettid() getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) getpgid(0x0) getpgrp(0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000200)=0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) 11:16:46 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) capget(&(0x7f0000000000), &(0x7f0000000080)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000380)=ANY=[], 0x0) 11:16:46 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) clock_gettime(0x0, &(0x7f00000002c0)) socket$packet(0x11, 0x0, 0x300) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() 11:16:47 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001880)=0xffffffffffffff50) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) geteuid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000880)='nodevcpuset&.security}cgroup\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000000080)=0xc) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) fstat(0xffffffffffffffff, &(0x7f0000001680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000054c0), &(0x7f0000005500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005540)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000005640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005680), &(0x7f00000056c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006c00)='nodev\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c80)={{{@in6}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000006d80)=0xe8) getresgid(&(0x7f0000006dc0), &(0x7f0000006e00), &(0x7f0000006e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006e80)) getresuid(&(0x7f0000006ec0), &(0x7f0000006f00), &(0x7f0000006f40)) getegid() getpgrp(0xffffffffffffffff) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009bc0), &(0x7f0000009c00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 11:16:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:52 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) capget(&(0x7f0000000000), &(0x7f0000000080)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000380)=ANY=[], 0x0) 11:16:52 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) clock_gettime(0x0, &(0x7f00000002c0)) socket$packet(0x11, 0x0, 0x300) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() 11:16:52 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001880)=0xffffffffffffff50) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) geteuid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000880)='nodevcpuset&.security}cgroup\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000000080)=0xc) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) fstat(0xffffffffffffffff, &(0x7f0000001680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000054c0), &(0x7f0000005500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005540)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000005640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005680), &(0x7f00000056c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006c00)='nodev\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c80)={{{@in6}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000006d80)=0xe8) getresgid(&(0x7f0000006dc0), &(0x7f0000006e00), &(0x7f0000006e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006e80)) getresuid(&(0x7f0000006ec0), &(0x7f0000006f00), &(0x7f0000006f40)) getegid() getpgrp(0xffffffffffffffff) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009bc0), &(0x7f0000009c00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 11:16:52 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00'}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x14) geteuid() getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getgid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgroups(0x0, &(0x7f00000008c0)) getgroups(0x0, &(0x7f0000000900)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getegid() getgroups(0x0, &(0x7f0000000a00)) getgroups(0x0, &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000a80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000000ac0), 0x24, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000680)={0x0, &(0x7f0000000380)}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000340), 0xc, &(0x7f0000000c40)={&(0x7f0000000800)=ANY=[]}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) close(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000440)}}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000740)) timer_settime(0x0, 0x0, &(0x7f0000000780), &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 11:16:53 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) capget(&(0x7f0000000000), &(0x7f0000000080)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000380)=ANY=[], 0x0) 11:16:53 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001880)=0xffffffffffffff50) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) geteuid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000880)='nodevcpuset&.security}cgroup\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000000080)=0xc) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) fstat(0xffffffffffffffff, &(0x7f0000001680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000054c0), &(0x7f0000005500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005540)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000005640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005680), &(0x7f00000056c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006c00)='nodev\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c80)={{{@in6}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000006d80)=0xe8) getresgid(&(0x7f0000006dc0), &(0x7f0000006e00), &(0x7f0000006e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006e80)) getresuid(&(0x7f0000006ec0), &(0x7f0000006f00), &(0x7f0000006f40)) getegid() getpgrp(0xffffffffffffffff) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009bc0), &(0x7f0000009c00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 11:16:53 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) clock_gettime(0x0, &(0x7f00000002c0)) socket$packet(0x11, 0x0, 0x300) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() 11:16:55 executing program 5: memfd_create(&(0x7f0000000040)='$}posix_acl_access\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast2, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000880)=0xc) geteuid() getgroups(0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f0000000940)=0xc) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) lstat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f00000014c0)) fchown(0xffffffffffffffff, 0x0, 0x0) getuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000001300)) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/4096) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000001340)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 11:16:55 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001880)=0xffffffffffffff50) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) geteuid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000880)='nodevcpuset&.security}cgroup\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000000080)=0xc) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) fstat(0xffffffffffffffff, &(0x7f0000001680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000054c0), &(0x7f0000005500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005540)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000005640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005680), &(0x7f00000056c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006c00)='nodev\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c80)={{{@in6}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000006d80)=0xe8) getresgid(&(0x7f0000006dc0), &(0x7f0000006e00), &(0x7f0000006e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006e80)) getresuid(&(0x7f0000006ec0), &(0x7f0000006f00), &(0x7f0000006f40)) getegid() getpgrp(0xffffffffffffffff) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009bc0), &(0x7f0000009c00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 11:16:55 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:55 executing program 3: timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) ioprio_set$pid(0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/relabel\x00', 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000900)=@abs, &(0x7f0000000980)=0x6e) geteuid() getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) getegid() geteuid() getgroups(0x0, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getgroups(0x0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006d00)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000006e00)=0xe8) getresgid(&(0x7f0000006e40), &(0x7f0000006e80), &(0x7f0000006ec0)) getuid() lstat(&(0x7f0000008300)='./file1\x00', &(0x7f0000007200)) stat(&(0x7f0000007280)='./file0\x00', &(0x7f00000072c0)) getegid() lstat(&(0x7f0000007340)='./file0\x00', &(0x7f0000007380)) stat(&(0x7f0000007400)='./file0/file0\x00', &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000074c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000075c0)=0xe8) getresgid(&(0x7f0000007600), &(0x7f0000007640), &(0x7f0000007680)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:16:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x120, 0x0, 0x54fca8a0505bc126) 11:16:56 executing program 0: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000140)={@dev}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bond_slave_0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000940)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000a00), &(0x7f0000000a40)=0x14) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[]}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x48, &(0x7f0000000200)={@remote}, 0x20) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 11:16:56 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:56 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:56 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:56 executing program 3: timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) ioprio_set$pid(0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/relabel\x00', 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000900)=@abs, &(0x7f0000000980)=0x6e) geteuid() getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) getegid() geteuid() getgroups(0x0, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getgroups(0x0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006d00)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000006e00)=0xe8) getresgid(&(0x7f0000006e40), &(0x7f0000006e80), &(0x7f0000006ec0)) getuid() lstat(&(0x7f0000008300)='./file1\x00', &(0x7f0000007200)) stat(&(0x7f0000007280)='./file0\x00', &(0x7f00000072c0)) getegid() lstat(&(0x7f0000007340)='./file0\x00', &(0x7f0000007380)) stat(&(0x7f0000007400)='./file0/file0\x00', &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000074c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000075c0)=0xe8) getresgid(&(0x7f0000007600), &(0x7f0000007640), &(0x7f0000007680)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:16:56 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:16:56 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:02 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f00007a8fff), 0x0, 0x0, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 11:17:02 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000006bc0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000740)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/194) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000005c0), 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006c80)=""/96, &(0x7f0000000480)=0x60) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) gettid() getgid() getresgid(&(0x7f0000000880), &(0x7f0000000b00), &(0x7f0000000b40)) getegid() stat(&(0x7f0000001e40)='./file1\x00', &(0x7f0000001e80)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) getgid() stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) fstat(0xffffffffffffff9c, &(0x7f0000003ec0)) getgid() getresgid(&(0x7f0000004280), &(0x7f00000042c0), &(0x7f0000004300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004340), &(0x7f0000004380)=0xc) fstat(0xffffffffffffffff, &(0x7f00000043c0)) 11:17:02 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:02 executing program 3: timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) ioprio_set$pid(0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/relabel\x00', 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000900)=@abs, &(0x7f0000000980)=0x6e) geteuid() getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) getegid() geteuid() getgroups(0x0, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getgroups(0x0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006d00)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000006e00)=0xe8) getresgid(&(0x7f0000006e40), &(0x7f0000006e80), &(0x7f0000006ec0)) getuid() lstat(&(0x7f0000008300)='./file1\x00', &(0x7f0000007200)) stat(&(0x7f0000007280)='./file0\x00', &(0x7f00000072c0)) getegid() lstat(&(0x7f0000007340)='./file0\x00', &(0x7f0000007380)) stat(&(0x7f0000007400)='./file0/file0\x00', &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000074c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000075c0)=0xe8) getresgid(&(0x7f0000007600), &(0x7f0000007640), &(0x7f0000007680)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:17:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)="7569645f6d6170001d900f92d915133d397ef8312c9e1ffb42e48fcba4b36f2205c146a79a77ba41bd56ab958e36c17dbc7d2b6aa1c1a8b1083acec13a0af98327d611f956085ff96e1ebd1a6371ca51") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) write$selinux_load(r3, &(0x7f0000000080)=ANY=[], 0x0) clone(0x64200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='ip_vti0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000140)) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000440)=""/193) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x8) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000280)=""/194, &(0x7f0000000380)=0xc2) ptrace(0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xb, 0xe, &(0x7f0000000580)=@raw=[@generic={0x0, 0x0, 0xfffffffffffffff9}, @generic={0x9, 0x9, 0xfffffffffffffff9, 0x171}, @alu={0x7, 0x7fff, 0xc, 0x27b51ab549434e8f, 0x5, 0xfffffffffffffffc, 0x10}, @alu={0x7, 0x44, 0xd, 0x7, 0x9, 0xc, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x9a, &(0x7f0000000640)=""/154, 0x0, 0x1}, 0x48) r7 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r7, r1, &(0x7f0000000000), 0x7fff) 11:17:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/4096, 0x1000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x2) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x200) dup3(r1, r0, 0x0) write(r0, &(0x7f0000000040)="06", 0x1) 11:17:02 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:02 executing program 2: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:02 executing program 3: timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) ioprio_set$pid(0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/relabel\x00', 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000900)=@abs, &(0x7f0000000980)=0x6e) geteuid() getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@local, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) getegid() geteuid() getgroups(0x0, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getgroups(0x0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006d00)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000006e00)=0xe8) getresgid(&(0x7f0000006e40), &(0x7f0000006e80), &(0x7f0000006ec0)) getuid() lstat(&(0x7f0000008300)='./file1\x00', &(0x7f0000007200)) stat(&(0x7f0000007280)='./file0\x00', &(0x7f00000072c0)) getegid() lstat(&(0x7f0000007340)='./file0\x00', &(0x7f0000007380)) stat(&(0x7f0000007400)='./file0/file0\x00', &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000074c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000075c0)=0xe8) getresgid(&(0x7f0000007600), &(0x7f0000007640), &(0x7f0000007680)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 11:17:02 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000006bc0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000740)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/194) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000005c0), 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006c80)=""/96, &(0x7f0000000480)=0x60) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) gettid() getgid() getresgid(&(0x7f0000000880), &(0x7f0000000b00), &(0x7f0000000b40)) getegid() stat(&(0x7f0000001e40)='./file1\x00', &(0x7f0000001e80)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) getgid() stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) fstat(0xffffffffffffff9c, &(0x7f0000003ec0)) getgid() getresgid(&(0x7f0000004280), &(0x7f00000042c0), &(0x7f0000004300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004340), &(0x7f0000004380)=0xc) fstat(0xffffffffffffffff, &(0x7f00000043c0)) 11:17:03 executing program 2: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:03 executing program 3: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000080)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000004c0)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000005c0)=""/34) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/184) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xffffffffffffffd9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) write$evdev(0xffffffffffffffff, &(0x7f0000000500), 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") [ 1679.852804] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1680.263099] updating oom_score_adj for 23639 (syz-executor1) from 0 to 0 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. 11:17:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/4096, 0x1000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x2) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x200) dup3(r1, r0, 0x0) write(r0, &(0x7f0000000040)="06", 0x1) 11:17:10 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000006bc0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000740)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/194) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000005c0), 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006c80)=""/96, &(0x7f0000000480)=0x60) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) gettid() getgid() getresgid(&(0x7f0000000880), &(0x7f0000000b00), &(0x7f0000000b40)) getegid() stat(&(0x7f0000001e40)='./file1\x00', &(0x7f0000001e80)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) getgid() stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) fstat(0xffffffffffffff9c, &(0x7f0000003ec0)) getgid() getresgid(&(0x7f0000004280), &(0x7f00000042c0), &(0x7f0000004300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004340), &(0x7f0000004380)=0xc) fstat(0xffffffffffffffff, &(0x7f00000043c0)) 11:17:10 executing program 2: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:10 executing program 3: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000080)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000004c0)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000005c0)=""/34) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/184) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xffffffffffffffd9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) write$evdev(0xffffffffffffffff, &(0x7f0000000500), 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") [ 1680.263113] updating oom_score_adj for 23647 (syz-executor1) from 0 to 0 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. [ 1680.263350] updating oom_score_adj for 23639 (syz-executor1) from 0 to 0 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. [ 1680.263362] updating oom_score_adj for 23647 (syz-executor1) from 0 to 0 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. [ 1680.263606] updating oom_score_adj for 23639 (syz-executor1) from 0 to 1 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. [ 1680.263641] updating oom_score_adj for 23647 (syz-executor1) from 0 to 1 because it shares mm with 23648 (syz-executor1). Report if this is unexpected. 11:17:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)="7569645f6d6170001d900f92d915133d397ef8312c9e1ffb42e48fcba4b36f2205c146a79a77ba41bd56ab958e36c17dbc7d2b6aa1c1a8b1083acec13a0af98327d611f956085ff96e1ebd1a6371ca51") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) write$selinux_load(r3, &(0x7f0000000080)=ANY=[], 0x0) clone(0x64200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='ip_vti0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000140)) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000440)=""/193) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x8) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000280)=""/194, &(0x7f0000000380)=0xc2) ptrace(0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xb, 0xe, &(0x7f0000000580)=@raw=[@generic={0x0, 0x0, 0xfffffffffffffff9}, @generic={0x9, 0x9, 0xfffffffffffffff9, 0x171}, @alu={0x7, 0x7fff, 0xc, 0x27b51ab549434e8f, 0x5, 0xfffffffffffffffc, 0x10}, @alu={0x7, 0x44, 0xd, 0x7, 0x9, 0xc, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x9a, &(0x7f0000000640)=""/154, 0x0, 0x1}, 0x48) r7 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r7, r1, &(0x7f0000000000), 0x7fff) 11:17:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/4096, 0x1000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x2) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x200) dup3(r1, r0, 0x0) write(r0, &(0x7f0000000040)="06", 0x1) 11:17:38 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000006bc0)=""/165) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000004c0)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000740)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/194) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000005c0), 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006c80)=""/96, &(0x7f0000000480)=0x60) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) gettid() getgid() getresgid(&(0x7f0000000880), &(0x7f0000000b00), &(0x7f0000000b40)) getegid() stat(&(0x7f0000001e40)='./file1\x00', &(0x7f0000001e80)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) getgid() stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) fstat(0xffffffffffffff9c, &(0x7f0000003ec0)) getgid() getresgid(&(0x7f0000004280), &(0x7f00000042c0), &(0x7f0000004300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004340), &(0x7f0000004380)=0xc) fstat(0xffffffffffffffff, &(0x7f00000043c0)) 11:17:38 executing program 2: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 11:17:38 executing program 3: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000080)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000004c0)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000005c0)=""/34) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/184) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xffffffffffffffd9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) write$evdev(0xffffffffffffffff, &(0x7f0000000500), 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") [ 1712.792468] CPU: 1 PID: 23647 Comm: syz-executor1 Not tainted 4.9.126+ #90 [ 1712.792484] ffff8801cb36f8a0 ffffffff81af1049 1ffff1003966df16 ffff8801d3314740 [ 1712.792493] ffffffff828a8aa0 0000000000000001 0000000000400000 ffff8801cb36f9e8 [ 1712.792501] ffffffff814dd11e 0000000041b58ab3 ffffffff82c34ac0 ffffffff8140f390 [ 1712.792503] Call Trace: [ 1712.792517] [] dump_stack+0xc1/0x128 [ 1712.792526] [] warn_alloc.cold.31+0xd5/0x141 [ 1712.792536] [] ? zone_watermark_ok_safe+0x250/0x250 [ 1712.792544] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.792553] [] ? avc_has_perm+0x9e/0x3a0 [ 1712.792561] [] __vmalloc_node_range+0x35e/0x600 [ 1712.792568] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.792576] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.792585] [] ? task_has_security+0x130/0x270 [ 1712.792591] [] vmalloc+0x5b/0x70 [ 1712.792598] [] ? sel_write_load+0x135/0xfa0 [ 1712.792605] [] sel_write_load+0x135/0xfa0 [ 1712.792613] [] ? sel_read_bool+0x240/0x240 [ 1712.792622] [] ? trace_hardirqs_on+0x10/0x10 [ 1712.792629] [] ? trace_hardirqs_on+0x10/0x10 [ 1712.792636] [] __vfs_write+0x115/0x580 [ 1712.792643] [] ? sel_read_bool+0x240/0x240 [ 1712.792649] [] ? __vfs_read+0x560/0x560 [ 1712.792656] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.792665] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 1712.792672] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1712.792687] [] ? __sb_start_write+0x161/0x300 [ 1712.792693] [] vfs_write+0x187/0x520 [ 1712.792700] [] SyS_write+0xd9/0x1c0 [ 1712.792713] [] ? SyS_read+0x1c0/0x1c0 [ 1712.792721] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 1712.792728] [] ? do_syscall_64+0x48/0x480 [ 1712.792734] [] ? SyS_read+0x1c0/0x1c0 [ 1712.792740] [] do_syscall_64+0x19f/0x480 [ 1712.792751] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 11:17:39 executing program 3: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000080)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000004c0)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000005c0)=""/34) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/184) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xffffffffffffffd9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) write$evdev(0xffffffffffffffff, &(0x7f0000000500), 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") [ 1712.792754] Mem-Info: [ 1712.792773] active_anon:147761 inactive_anon:50 isolated_anon:0 [ 1712.792773] active_file:9382 inactive_file:10396 isolated_file:0 [ 1712.792773] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1712.792773] slab_reclaimable:4970 slab_unreclaimable:62139 [ 1712.792773] mapped:55138 shmem:4282 pagetables:7120 bounce:0 [ 1712.792773] free:1346954 free_pcp:460 free_cma:0 11:17:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)="7569645f6d6170001d900f92d915133d397ef8312c9e1ffb42e48fcba4b36f2205c146a79a77ba41bd56ab958e36c17dbc7d2b6aa1c1a8b1083acec13a0af98327d611f956085ff96e1ebd1a6371ca51") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) write$selinux_load(r3, &(0x7f0000000080)=ANY=[], 0x0) clone(0x64200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='ip_vti0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000140)) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000440)=""/193) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x8) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000280)=""/194, &(0x7f0000000380)=0xc2) ptrace(0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xb, 0xe, &(0x7f0000000580)=@raw=[@generic={0x0, 0x0, 0xfffffffffffffff9}, @generic={0x9, 0x9, 0xfffffffffffffff9, 0x171}, @alu={0x7, 0x7fff, 0xc, 0x27b51ab549434e8f, 0x5, 0xfffffffffffffffc, 0x10}, @alu={0x7, 0x44, 0xd, 0x7, 0x9, 0xc, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x9a, &(0x7f0000000640)=""/154, 0x0, 0x1}, 0x48) r7 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r7, r1, &(0x7f0000000000), 0x7fff) 11:17:39 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 1712.792787] Node 0 active_anon:591044kB inactive_anon:200kB active_file:37528kB inactive_file:41584kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220552kB dirty:0kB writeback:0kB shmem:17128kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1712.792805] DMA32 free:3021328kB min:4696kB low:7716kB high:10736kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3021992kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:664kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1712.792832] Normal free:2366488kB min:5580kB low:9168kB high:12756kB active_anon:591044kB inactive_anon:200kB active_file:37528kB inactive_file:41584kB unevictable:0kB writepending:0kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19880kB slab_unreclaimable:248556kB kernel_stack:12960kB pagetables:28480kB bounce:0kB free_pcp:1176kB local_pcp:504kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1712.792893] DMA32: 6*4kB (UM) 3*8kB (M) 4*16kB (M) 3*32kB (UM) 3*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 3*2048kB (UM) 735*4096kB (M) = 3021328kB Normal: 216*4kB (UME) 31*8kB (UME) 298*16kB (UE) 221*32kB (UME) 106*64kB (UME) 20*128kB (UME) 15*256kB (UM) 11*512kB (UM) 10*1024kB (UM) 3*2048kB (UM) 566*4096kB (M) = 2366488kB 24060 total pagecache pages [ 1712.792948] 0 pages in swap cache [ 1712.792952] Swap cache stats: add 0, delete 0, find 0/0 [ 1712.792954] Free swap = 0kB [ 1712.792956] Total swap = 0kB [ 1712.792959] 1965979 pages RAM [ 1712.792961] 0 pages HighMem/MovableOnly [ 1712.792963] 313152 pages reserved [ 1712.793432] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1712.793440] CPU: 1 PID: 23651 Comm: syz-executor1 Not tainted 4.9.126+ #90 [ 1712.793455] ffff8801cf7978a0 ffffffff81af1049 1ffff10039ef2f16 ffff880190972f80 [ 1712.793468] ffffffff828a8aa0 0000000000000001 0000000000400000 ffff8801cf7979e8 [ 1712.793480] ffffffff814dd11e 0000000041b58ab3 ffffffff82c34ac0 ffffffff8140f390 [ 1712.793483] Call Trace: [ 1712.793493] [] dump_stack+0xc1/0x128 [ 1712.793502] [] warn_alloc.cold.31+0xd5/0x141 [ 1712.793513] [] ? zone_watermark_ok_safe+0x250/0x250 [ 1712.793523] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.793531] [] ? avc_has_perm+0x9e/0x3a0 [ 1712.793541] [] __vmalloc_node_range+0x35e/0x600 [ 1712.793550] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.793560] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.793568] [] ? task_has_security+0x130/0x270 [ 1712.793575] [] vmalloc+0x5b/0x70 [ 1712.793583] [] ? sel_write_load+0x135/0xfa0 [ 1712.793592] [] sel_write_load+0x135/0xfa0 [ 1712.793601] [] ? sel_read_bool+0x240/0x240 [ 1712.793608] [] ? trace_hardirqs_on+0x10/0x10 [ 1712.793616] [] ? trace_hardirqs_on+0x10/0x10 [ 1712.793624] [] __vfs_write+0x115/0x580 [ 1712.793633] [] ? sel_read_bool+0x240/0x240 [ 1712.793640] [] ? __vfs_read+0x560/0x560 [ 1712.793649] [] ? check_preemption_disabled+0x3b/0x170 [ 1712.793657] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 1712.793665] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1712.793673] [] ? __sb_start_write+0x161/0x300 [ 1712.793680] [] vfs_write+0x187/0x520 [ 1712.793688] [] SyS_write+0xd9/0x1c0 [ 1712.793695] [] ? SyS_read+0x1c0/0x1c0 [ 1712.793703] [] ? task_work_run+0x14a/0x180 [ 1712.793711] [] ? do_syscall_64+0x48/0x480 [ 1712.793718] [] ? SyS_read+0x1c0/0x1c0 [ 1712.793725] [] do_syscall_64+0x19f/0x480 [ 1712.793735] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1712.793738] Mem-Info: [ 1712.793760] active_anon:147761 inactive_anon:50 isolated_anon:0 [ 1712.793760] active_file:9382 inactive_file:10396 isolated_file:0 [ 1712.793760] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1712.793760] slab_reclaimable:4970 slab_unreclaimable:62139 [ 1712.793760] mapped:55138 shmem:4282 pagetables:7120 bounce:0 [ 1712.793760] free:1346954 free_pcp:460 free_cma:0 [ 1712.793779] Node 0 active_anon:591044kB inactive_anon:200kB active_file:37528kB inactive_file:41584kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220552kB dirty:0kB writeback:0kB shmem:17128kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1712.793799] DMA32 free:3021328kB min:4696kB low:7716kB high:10736kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3021992kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:664kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1712.793828] Normal free:2366488kB min:5580kB low:9168kB high:12756kB active_anon:591044kB inactive_anon:200kB active_file:37528kB inactive_file:41584kB unevictable:0kB writepending:0kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19880kB slab_unreclaimable:248556kB kernel_stack:12928kB pagetables:28480kB bounce:0kB free_pcp:1176kB local_pcp:504kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1712.793892] DMA32: 6*4kB (UM) 3*8kB (M) 4*16kB (M) 3*32kB (UM) 3*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 3*2048kB (UM) 735*4096kB (M) = 3021328kB Normal: 216*4kB (UME) 31*8kB (UME) 298*16kB (UE) 222*32kB (UME) 106*64kB (UME) 20*128kB (UME) 15*256kB (UM) 11*512kB (UM) 10*1024kB (UM) 3*2048kB (UM) 566*4096kB (M) = 2366520kB 24060 total pagecache pages [ 1712.793950] 0 pages in swap cache [ 1712.793954] Swap cache stats: add 0, delete 0, find 0/0 [ 1712.793957] Free swap = 0kB [ 1712.793959] Total swap = 0kB [ 1712.793961] 1965979 pages RAM [ 1712.793963] 0 pages HighMem/MovableOnly [ 1712.793966] 313152 pages reserved [ 1713.669322] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1713.669331] CPU: 1 PID: 23696 Comm: syz-executor2 Not tainted 4.9.126+ #90 [ 1713.669346] ffff8801937df8a0 ffffffff81af1049 1ffff100326fbf16 ffff8801ca32df00 [ 1713.669357] ffffffff828a8aa0 0000000000000001 0000000000400000 ffff8801937df9e8 [ 1713.669367] ffffffff814dd11e 0000000041b58ab3 ffffffff82c34ac0 ffffffff8140f390 [ 1713.669369] Call Trace: [ 1713.669385] [] dump_stack+0xc1/0x128 [ 1713.669396] [] warn_alloc.cold.31+0xd5/0x141 [ 1713.669421] [] ? zone_watermark_ok_safe+0x250/0x250 [ 1713.669432] [] ? check_preemption_disabled+0x3b/0x170 [ 1713.669443] [] ? avc_has_perm+0x9e/0x3a0 [ 1713.669453] [] __vmalloc_node_range+0x35e/0x600 [ 1713.669463] [] ? check_preemption_disabled+0x3b/0x170 [ 1713.669474] [] ? check_preemption_disabled+0x3b/0x170 [ 1713.669484] [] ? task_has_security+0x130/0x270 [ 1713.669492] [] vmalloc+0x5b/0x70 [ 1713.669502] [] ? sel_write_load+0x135/0xfa0 [ 1713.669512] [] sel_write_load+0x135/0xfa0 [ 1713.669521] [] ? sel_read_bool+0x240/0x240 [ 1713.669530] [] ? trace_hardirqs_on+0x10/0x10 [ 1713.669538] [] ? trace_hardirqs_on+0x10/0x10 [ 1713.669546] [] __vfs_write+0x115/0x580 [ 1713.669554] [] ? sel_read_bool+0x240/0x240 [ 1713.669562] [] ? __vfs_read+0x560/0x560 [ 1713.669571] [] ? check_preemption_disabled+0x3b/0x170 [ 1713.669580] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 1713.669588] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1713.669597] [] ? __sb_start_write+0x161/0x300 [ 1713.669604] [] vfs_write+0x187/0x520 [ 1713.669612] [] SyS_write+0xd9/0x1c0 [ 1713.669620] [] ? SyS_read+0x1c0/0x1c0 [ 1713.669628] [] ? task_work_run+0x14a/0x180 [ 1713.669637] [] ? do_syscall_64+0x48/0x480 [ 1713.669644] [] ? SyS_read+0x1c0/0x1c0 [ 1713.669652] [] do_syscall_64+0x19f/0x480 [ 1713.669663] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1713.669667] Mem-Info: [ 1713.669691] active_anon:147860 inactive_anon:50 isolated_anon:0 [ 1713.669691] active_file:9384 inactive_file:10406 isolated_file:0 [ 1713.669691] unevictable:4 dirty:39 writeback:0 unstable:0 [ 1713.669691] slab_reclaimable:4970 slab_unreclaimable:62057 [ 1713.669691] mapped:55138 shmem:4282 pagetables:7223 bounce:0 [ 1713.669691] free:1346820 free_pcp:346 free_cma:0 [ 1713.669712] Node 0 active_anon:591440kB inactive_anon:200kB active_file:37536kB inactive_file:41624kB unevictable:16kB isolated(anon):0kB isolated(file):0kB mapped:220552kB dirty:156kB writeback:0kB shmem:17128kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1713.669736] DMA32 free:3021328kB min:4696kB low:7716kB high:10736kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3021992kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:664kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1713.669768] Normal free:2365952kB min:5580kB low:9168kB high:12756kB active_anon:591440kB inactive_anon:200kB active_file:37536kB inactive_file:41624kB unevictable:16kB writepending:156kB present:4718592kB managed:3589316kB mlocked:16kB slab_reclaimable:19880kB slab_unreclaimable:248228kB kernel_stack:13248kB pagetables:28892kB bounce:0kB free_pcp:720kB local_pcp:580kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1713.669999] DMA32: 6*4kB (UM) 3*8kB (M) 4*16kB (M) 3*32kB (UM) 3*64kB (UM) 3*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 3*2048kB (UM) 735*4096kB (M) = 3021328kB Normal: 216*4kB (ME) 30*8kB (ME) 265*16kB (UE) 216*32kB (UME) 106*64kB (UME) 20*128kB (UME) 15*256kB (UM) 11*512kB (UM) 10*1024kB (UM) 3*2048kB (UM) 566*4096kB (M) = 2365792kB 24071 total pagecache pages [ 1713.670195] 0 pages in swap cache [ 1713.670201] Swap cache stats: add 0, delete 0, find 0/0 [ 1713.670204] Free swap = 0kB [ 1713.670207] Total swap = 0kB [ 1713.670209] 1965979 pages RAM [ 1713.670213] 0 pages HighMem/MovableOnly [ 1713.670215] 313152 pages reserved [ 1713.754912] updating oom_score_adj for 23699 (syz-executor2) from 0 to 0 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1713.754923] updating oom_score_adj for 23701 (syz-executor2) from 0 to 0 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1713.755115] updating oom_score_adj for 23699 (syz-executor2) from 0 to 0 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1713.755124] updating oom_score_adj for 23701 (syz-executor2) from 0 to 0 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1713.755327] updating oom_score_adj for 23699 (syz-executor2) from 0 to 1 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1713.755336] updating oom_score_adj for 23701 (syz-executor2) from 0 to 1 because it shares mm with 23692 (syz-executor2). Report if this is unexpected. [ 1716.252491] syz-executor1: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) 11:17:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/4096, 0x1000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x2) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x200) dup3(r1, r0, 0x0) write(r0, &(0x7f0000000040)="06", 0x1) 11:17:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)="7569645f6d6170001d900f92d915133d397ef8312c9e1ffb42e48fcba4b36f2205c146a79a77ba41bd56ab958e36c17dbc7d2b6aa1c1a8b1083acec13a0af98327d611f956085ff96e1ebd1a6371ca51") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) write$selinux_load(r3, &(0x7f0000000080)=ANY=[], 0x0) clone(0x64200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='ip_vti0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000140)) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000440)=""/193) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x8) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000280)=""/194, &(0x7f0000000380)=0xc2) ptrace(0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xb, 0xe, &(0x7f0000000580)=@raw=[@generic={0x0, 0x0, 0xfffffffffffffff9}, @generic={0x9, 0x9, 0xfffffffffffffff9, 0x171}, @alu={0x7, 0x7fff, 0xc, 0x27b51ab549434e8f, 0x5, 0xfffffffffffffffc, 0x10}, @alu={0x7, 0x44, 0xd, 0x7, 0x9, 0xc, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x9a, &(0x7f0000000640)=""/154, 0x0, 0x1}, 0x48) r7 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r7, r1, &(0x7f0000000000), 0x7fff) 11:17:43 executing program 3: mkdir(&(0x7f0000000340)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) rmdir(&(0x7f00000004c0)='./control\x00') getdents(r0, &(0x7f0000000240)=""/219, 0xdb) 11:17:43 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 1716.923064] updating oom_score_adj for 23713 (syz-executor1) from 0 to 0 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1716.923074] updating oom_score_adj for 23716 (syz-executor1) from 0 to 0 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1716.923270] updating oom_score_adj for 23713 (syz-executor1) from 0 to 0 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1716.923279] updating oom_score_adj for 23716 (syz-executor1) from 0 to 0 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1716.923476] updating oom_score_adj for 23713 (syz-executor1) from 0 to 1 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1716.923485] updating oom_score_adj for 23716 (syz-executor1) from 0 to 1 because it shares mm with 23709 (syz-executor1). Report if this is unexpected. [ 1717.334301] updating oom_score_adj for 23727 (syz-executor2) from 0 to 0 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1717.334315] updating oom_score_adj for 23729 (syz-executor2) from 0 to 0 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1717.334580] updating oom_score_adj for 23727 (syz-executor2) from 0 to 0 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1717.334591] updating oom_score_adj for 23729 (syz-executor2) from 0 to 0 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1717.334848] updating oom_score_adj for 23727 (syz-executor2) from 0 to 1 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1717.334861] updating oom_score_adj for 23729 (syz-executor2) from 0 to 1 because it shares mm with 23717 (syz-executor2). Report if this is unexpected. [ 1755.762487] CPU: 1 PID: 23711 Comm: syz-executor1 Not tainted 4.9.126+ #90 [ 1755.769552] ffff8801ca8e78a0 ffffffff81af1049 1ffff1003951cf16 ffff8801cbbd17c0 [ 1755.777596] ffffffff828a8aa0 0000000000000001 0000000000400000 ffff8801ca8e79e8 [ 1755.785643] ffffffff814dd11e 0000000041b58ab3 ffffffff82c34ac0 ffffffff8140f390 [ 1755.793685] Call Trace: [ 1755.796300] [] dump_stack+0xc1/0x128 [ 1755.801663] [] warn_alloc.cold.31+0xd5/0x141 [ 1755.807750] [] ? zone_watermark_ok_safe+0x250/0x250 [ 1755.814432] [] ? check_preemption_disabled+0x3b/0x170 [ 1755.821276] [] ? avc_has_perm+0x9e/0x3a0 [ 1755.826994] [] __vmalloc_node_range+0x35e/0x600 [ 1755.833318] [] ? check_preemption_disabled+0x3b/0x170 [ 1755.840163] [] ? check_preemption_disabled+0x3b/0x170 [ 1755.847010] [] ? task_has_security+0x130/0x270 [ 1755.853252] [] vmalloc+0x5b/0x70 [ 1755.858274] [] ? sel_write_load+0x135/0xfa0 [ 1755.864247] [] sel_write_load+0x135/0xfa0 [ 1755.870047] [] ? sel_read_bool+0x240/0x240 [ 1755.875934] [] ? trace_hardirqs_on+0x10/0x10 [ 1755.881993] [] ? trace_hardirqs_on+0x10/0x10 [ 1755.888058] [] __vfs_write+0x115/0x580 [ 1755.893604] [] ? sel_read_bool+0x240/0x240 [ 1755.899504] [] ? __vfs_read+0x560/0x560 [ 1755.905148] [] ? check_preemption_disabled+0x3b/0x170 [ 1755.911995] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 1755.918849] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1755.925543] [] ? __sb_start_write+0x161/0x300 [ 1755.931693] [] vfs_write+0x187/0x520 [ 1755.937063] [] SyS_write+0xd9/0x1c0 [ 1755.942346] [] ? SyS_read+0x1c0/0x1c0 [ 1755.947800] [] ? task_work_run+0x14a/0x180 [ 1755.953687] [] ? do_syscall_64+0x48/0x480 [ 1755.959520] [] ? SyS_read+0x1c0/0x1c0 [ 1755.964972] [] do_syscall_64+0x19f/0x480 [ 1755.970688] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1830.392426] Mem-Info: [ 1830.394905] active_anon:145840 inactive_anon:50 isolated_anon:0 [ 1830.394905] active_file:9407 inactive_file:10431 isolated_file:0 [ 1830.394905] unevictable:0 dirty:13 writeback:0 unstable:0 [ 1830.394905] slab_reclaimable:4950 slab_unreclaimable:62153 [ 1830.394905] mapped:55138 shmem:4282 pagetables:4985 bounce:0 [ 1830.394905] free:1352168 free_pcp:300 free_cma:0 [ 1842.882504] Node 0 active_anon:583196kB inactive_anon:200kB active_file:37636kB inactive_file:41732kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220552kB dirty:40kB writeback:0kB shmem:17128kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1851.462484] DMA32 free:3021328kB min:4696kB low:7716kB high:10736kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3021992kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:664kB local_pcp:0kB free_cma:0kB [ 1862.072683] lowmem_reserve[]: 0 3505 3505 [ 1862.794273] Normal free:2387080kB min:5580kB low:9168kB high:12756kB active_anon:583364kB inactive_anon:200kB active_file:37660kB inactive_file:41740kB unevictable:0kB writepending:48kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:19804kB slab_unreclaimable:249312kB kernel_stack:9984kB pagetables:19936kB bounce:0kB free_pcp:488kB local_pcp:192kB free_cma:0kB [ 1862.862602] INFO: task syz-executor2:23726 blocked for more than 140 seconds. [ 1862.862608] Not tainted 4.9.126+ #90 [ 1862.862610] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1862.862629] syz-executor2 D28832 23726 2091 0x00000004 [ 1862.862644] ffff8801cbc6c740 ffff8801d628e880 ffff88018fb88580 ffff8801943d0000 [ 1862.862656] ffff8801db621018 ffff88019076f978 ffffffff8277d952 0000000000000002 [ 1862.862667] ffff8801cbc6cff0 ffffed003978d9fd 00ff8801cbc6c740 ffff8801db6218f0 [ 1862.862669] Call Trace: [ 1862.862686] [] ? __schedule+0x662/0x1b10 [ 1862.862694] [] schedule+0x7f/0x1b0 [ 1862.862703] [] schedule_preempt_disabled+0x13/0x20 [ 1862.862711] [] mutex_lock_nested+0x326/0x870 [ 1862.862721] [] ? sel_write_load+0xba/0xfa0 [ 1862.862729] [] ? plist_check_head+0x61/0x80 [ 1862.862736] [] ? mutex_trylock+0x3e0/0x3e0 [ 1862.862747] [] ? drop_futex_key_refs.isra.2+0x56/0xd0 [ 1862.862755] [] sel_write_load+0xba/0xfa0 [ 1862.862763] [] ? sel_read_bool+0x240/0x240 [ 1862.862772] [] ? trace_hardirqs_on+0x10/0x10 [ 1862.862780] [] ? trace_hardirqs_on+0x10/0x10 [ 1862.862788] [] __vfs_write+0x115/0x580 [ 1862.862795] [] ? sel_read_bool+0x240/0x240 [ 1862.862802] [] ? __vfs_read+0x560/0x560 [ 1862.862811] [] ? check_preemption_disabled+0x3b/0x170 [ 1862.862820] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 1862.862828] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1862.862836] [] ? __sb_start_write+0x161/0x300 [ 1862.862843] [] vfs_write+0x187/0x520 [ 1862.862851] [] SyS_write+0xd9/0x1c0 [ 1862.862858] [] ? SyS_read+0x1c0/0x1c0 [ 1862.862866] [] ? task_work_run+0x14a/0x180 [ 1862.862874] [] ? do_syscall_64+0x48/0x480 [ 1862.862881] [] ? SyS_read+0x1c0/0x1c0 [ 1862.862888] [] do_syscall_64+0x19f/0x480 [ 1862.862897] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1862.862900] [ 1862.862900] Showing all locks held in the system: [ 1862.862907] 2 locks held by khungtaskd/24: [ 1862.862924] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 1862.862940] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 1862.862947] 1 lock held by rsyslogd/1893: [ 1862.862962] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0xac/0xd0 [ 1862.862966] 2 locks held by getty/2020: [ 1862.862981] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1862.862996] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 1862.863011] 3 locks held by syz-executor2/23726: [ 1862.863025] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0xac/0xd0 [ 1862.863040] #1: (sb_writers#3){.+.+.+}, at: [] vfs_write+0x3eb/0x520 [ 1862.863053] #2: (sel_mutex){+.+.+.}, at: [] sel_write_load+0xba/0xfa0 [ 1862.863057] [ 1862.863059] ============================================= [ 1862.863059] [ 1862.863062] NMI backtrace for cpu 1 [ 1862.863070] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.126+ #90 [ 1862.863081] ffff8801d9907d08 ffffffff81af1049 0000000000000000 0000000000000001 [ 1862.863092] 0000000000000001 0000000000000001 ffffffff810967d0 ffff8801d9907d40 [ 1862.863102] ffffffff81afbda9 0000000000000001 0000000000000000 0000000000000003 [ 1862.863104] Call Trace: [ 1862.863114] [] dump_stack+0xc1/0x128 [ 1862.863124] [] ? irq_force_complete_move+0x330/0x330 [ 1862.863131] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 1862.863140] [] ? irq_force_complete_move+0x330/0x330 [ 1862.863147] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 1862.863156] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1862.863163] [] watchdog+0x6ad/0xa20 [ 1862.863170] [] ? watchdog+0x11c/0xa20 [ 1862.863178] [] kthread+0x26d/0x300 [ 1862.863186] [] ? reset_hung_task_detector+0x20/0x20 [ 1862.863193] [] ? kthread_park+0xa0/0xa0 [ 1862.863202] [] ? __switch_to_asm+0x34/0x70 [ 1862.863209] [] ? kthread_park+0xa0/0xa0 [ 1862.863217] [] ? kthread_park+0xa0/0xa0 [ 1862.863225] [] ret_from_fork+0x5c/0x70 [ 1862.863249] Sending NMI from CPU 1 to CPUs 0: [ 1862.863558] NMI backtrace for cpu 0 [ 1862.863562] CPU: 0 PID: 14028 Comm: syz-executor0 Not tainted 4.9.126+ #90 [ 1862.863565] task: ffff8801943d0000 task.stack: ffff8801c54d0000 [ 1862.863569] RIP: 0010:[] c [] trace_hardirqs_off_caller+0xdb/0x280 [ 1862.863571] RSP: 0018:ffff8801c54d7f78 EFLAGS: 00000046 [ 1862.863575] RAX: 0000000000000003 RBX: ffff8801943d0000 RCX: 0000000000000000 [ 1862.863578] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffffffff83fe9840 [ 1862.863581] RBP: ffff8801c54d7f98 R08: 0000000000000000 R09: 0000000000000000 [ 1862.863584] R10: 0000000000000000 R11: 0000000000000246 R12: ffff8801943d0000 [ 1862.863588] R13: ffffffff8278ca0d R14: 00007f56ab3829c0 R15: 0000000000000000 [ 1862.863591] FS: 00007f56ab382700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 1862.863594] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1862.863597] CR2: 00007f3c5dc50000 CR3: 00000001c8917000 CR4: 00000000001606b0 [ 1862.863600] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1862.863604] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1862.863605] Stack: [ 1862.863609] 0000000000000046c 00000000009300a8c 00000000009300acc 0000000000a3fb9fc [ 1862.863613] ffff8801c54d7ff0c ffffffff81002286c 0000000000000246c 0000000000000000c [ 1862.863616] 0000000000000000c 0000000000000000c 00000000000000cac 00000000004572d9c [ 1862.863618] Call Trace: [ 1862.863621] [] trace_hardirqs_off_thunk+0x1a/0x1c [ 1862.863624] [] entry_SYSCALL_64_after_swapgs+0x17/0xdb [ 1862.863635] Code: c48 c89 cfa c48 cc1 cea c03 c0f cb6 c14 c02 c48 c89 cf8 c83 ce0 c07 c83 cc0 c03 c38 cd0 c7c c08 c84 cd2 c0f c85 c66 c01 c00 c00 c8b c0d c0a c16 cdf c02 c85 cc9 c75 c10 c9c c<58> c0f c1f c44 c00 c00 cf6 cc4 c02 c0f c85 ce1 c00 c00 c00 c48 c8d cbb c78 c08 c00 c [ 1862.864265] Kernel panic - not syncing: hung_task: blocked tasks [ 1862.864271] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.126+ #90 [ 1862.864283] ffff8801d9907cc8 ffffffff81af1049 ffffffff82878340 00000000ffffffff [ 1862.864294] 0000000000000000 0000000000000001 dffffc0000000000 ffff8801d9907d88 [ 1862.864304] ffffffff813df5e5 0000000041b58ab3 ffffffff82c286e3 ffffffff813df426 [ 1862.864306] Call Trace: [ 1862.864315] [] dump_stack+0xc1/0x128 [ 1862.864322] [] panic+0x1bf/0x39f [ 1862.864330] [] ? add_taint.cold.6+0x16/0x16 [ 1862.864338] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 1862.864345] [] watchdog+0x6be/0xa20 [ 1862.864352] [] ? watchdog+0x11c/0xa20 [ 1862.864360] [] kthread+0x26d/0x300 [ 1862.864368] [] ? reset_hung_task_detector+0x20/0x20 [ 1862.864375] [] ? kthread_park+0xa0/0xa0 [ 1862.864384] [] ? __switch_to_asm+0x34/0x70 [ 1862.864391] [] ? kthread_park+0xa0/0xa0 [ 1862.864399] [] ? kthread_park+0xa0/0xa0 [ 1862.864407] [] ret_from_fork+0x5c/0x70 [ 1862.864771] Dumping ftrace buffer: [ 1862.864845] (ftrace buffer empty) [ 1862.864847] Kernel Offset: disabled [ 1863.606134] Rebooting in 86400 seconds..