recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:47 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:48 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:48 executing program 5: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x800000, &(0x7f0000000040)={0x77359400}, &(0x7f0000000140), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2170.093504] audit: type=1326 audit(1537079508.103:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26825 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:31:48 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:48 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:48 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:31:48 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:48 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:31:48 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:48 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:31:48 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:49 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:49 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:49 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:49 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:49 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:49 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:49 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:49 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:49 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:49 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:49 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:50 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:50 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:50 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:50 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:51 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:51 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:51 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:51 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:51 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:51 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:51 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:51 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:52 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:52 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:52 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:52 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:52 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:52 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:52 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:53 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:53 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:53 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:53 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:53 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:53 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:54 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:54 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:54 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:54 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:54 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:54 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:54 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:55 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:55 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:55 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:55 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:55 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:55 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:55 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:55 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:55 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:55 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:56 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:56 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:56 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:56 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:56 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:56 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:56 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:56 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:56 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:56 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:56 executing program 2: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:57 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:57 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:57 executing program 2: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:57 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:57 executing program 2: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:57 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:57 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:58 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:58 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:58 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:58 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:58 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:58 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:31:58 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:59 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:31:59 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:59 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:59 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:59 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:31:59 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:31:59 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:31:59 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:00 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:00 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:00 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:00 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:00 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:00 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:00 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:00 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:00 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:00 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:01 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) [ 2183.674695] audit: type=1326 audit(1537079521.684:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27253 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:01 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:01 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:02 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) [ 2183.975253] audit: type=1326 audit(1537079521.965:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27262 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:02 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:02 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2184.313954] audit: type=1326 audit(1537079522.324:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27276 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:02 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:02 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:02 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)=""/9) 06:32:03 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:03 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:03 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:03 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:03 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:03 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)=""/9) 06:32:03 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:04 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:04 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:04 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:04 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:04 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:04 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)=""/9) 06:32:04 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:04 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:04 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:05 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:05 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:05 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:05 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:05 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:05 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:05 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:05 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:05 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:06 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:06 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:06 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2188.365712] audit: type=1326 audit(1537079526.375:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27387 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:06 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:06 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:06 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:06 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:06 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:06 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:07 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:07 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:07 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2189.336962] audit: type=1326 audit(1537079527.347:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27418 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:07 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:07 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:07 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:07 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:07 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:07 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:08 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:08 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2190.304056] audit: type=1326 audit(1537079528.314:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27446 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:08 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:08 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:08 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:08 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:09 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:09 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:09 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:09 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:09 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:10 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:10 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:10 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:10 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:10 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:10 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:11 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:11 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:11 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:11 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:11 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:12 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:12 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:12 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:12 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:12 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:12 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:12 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:12 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:13 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:13 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:13 executing program 1: capget(&(0x7f00000000c0), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:13 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:13 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:13 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:13 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:13 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:13 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:14 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:14 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:14 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:14 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:14 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:14 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:14 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:14 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:14 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:15 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:15 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:15 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:15 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:15 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:15 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:15 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:15 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:15 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:16 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:16 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:16 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:16 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2198.508068] audit: type=1326 audit(1537079536.518:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27650 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:16 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:16 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2198.823173] audit: type=1326 audit(1537079536.833:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27658 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:16 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:16 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:17 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:17 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) [ 2199.247680] audit: type=1326 audit(1537079537.257:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27673 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:17 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:17 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:17 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:17 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:18 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:18 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:18 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:18 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:18 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:19 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:19 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:19 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:19 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:19 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:19 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:19 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:19 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:20 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:20 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:20 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:20 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:20 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:20 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:20 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:20 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:20 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:21 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:21 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) 06:32:21 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:21 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:21 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) [ 2203.483933] audit: type=1326 audit(1537079541.494:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27781 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:21 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:21 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:21 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:22 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:22 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:22 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) [ 2204.472742] audit: type=1326 audit(1537079542.482:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27802 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:22 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:22 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:22 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:22 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:23 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:23 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:23 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:23 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:23 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/9) [ 2205.447223] audit: type=1326 audit(1537079543.457:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27830 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:23 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:23 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:23 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:23 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:24 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:24 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:24 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:24 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)=""/9) 06:32:24 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:25 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:25 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:25 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:25 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:25 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:25 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:26 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:26 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:26 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:26 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:26 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:26 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:26 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:27 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:27 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:27 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:27 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:27 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:27 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:28 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:28 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:28 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:28 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:28 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:28 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:28 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:29 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:29 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:29 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:29 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:30 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:30 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:30 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:31 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:31 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:31 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:32 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:32 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:32 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2214.327515] audit: type=1326 audit(1537079552.337:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28052 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:32 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:32 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:32 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:32 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:32 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:32 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:33 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:33 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2215.396096] audit: type=1326 audit(1537079553.406:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28083 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:33 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:33 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:33 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:33 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:34 executing program 3: capget(&(0x7f00000000c0), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:34 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:34 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:34 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2216.391725] audit: type=1326 audit(1537079554.401:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28119 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:34 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:34 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:34 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:34 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2216.909264] audit: type=1326 audit(1537079554.919:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28136 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:35 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:35 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:35 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:35 executing program 2: capget(&(0x7f00000000c0), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) [ 2217.256693] audit: type=1326 audit(1537079555.262:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28149 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 2217.348728] audit: type=1326 audit(1537079555.320:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28152 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:35 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:35 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:35 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2217.600820] audit: type=1326 audit(1537079555.607:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28162 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:35 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:35 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:35 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:36 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:36 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:36 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:36 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2218.293358] audit: type=1326 audit(1537079556.303:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28184 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:36 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:36 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:36 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:36 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:36 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:36 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:37 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:37 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:37 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:37 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:37 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2219.282410] audit: type=1326 audit(1537079557.291:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28218 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:37 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:37 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:37 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2219.677073] audit: type=1326 audit(1537079557.687:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28230 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:37 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:37 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:37 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2220.006635] audit: type=1326 audit(1537079558.016:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28241 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:38 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:38 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) [ 2220.275338] audit: type=1326 audit(1537079558.280:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28250 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:38 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0x101, 0xffffffffffffffff, 0x2000, 0x5, 0x2c, 0x2000000, 0x101, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:38 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:38 executing program 0: capget(&(0x7f00000000c0), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 06:32:38 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:38 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:38 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:38 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:38 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:39 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:39 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:39 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) 06:32:39 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:39 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:39 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:39 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2221.959308] audit: type=1326 audit(1537079559.969:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28297 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:40 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:40 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:40 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:40 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:40 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:40 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd80000000000000}, 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:40 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:40 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:40 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:41 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:41 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:41 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:41 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:42 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:42 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 2224.198730] audit: type=1326 audit(1537079562.208:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28363 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:42 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:42 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:42 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:42 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:42 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:42 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:42 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:42 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:43 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2225.185275] audit: type=1326 audit(1537079563.195:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28399 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:43 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:43 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:43 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:43 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:43 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:43 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:43 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:44 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:44 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:44 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:44 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2226.236137] audit: type=1326 audit(1537079564.246:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28442 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:44 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:44 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:44 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:44 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:44 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:44 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:44 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:45 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:45 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:45 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") [ 2227.141330] audit: type=1326 audit(1537079565.142:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28473 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:45 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:45 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:45 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:45 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:45 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:45 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:46 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:46 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") [ 2228.164016] audit: type=1326 audit(1537079566.174:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28504 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:46 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:46 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:46 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:46 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:47 executing program 5: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:47 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") [ 2229.181303] audit: type=1326 audit(1537079567.191:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28522 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:47 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:47 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:47 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:47 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:48 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:48 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:48 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:48 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:48 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:48 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:48 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:48 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:48 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:49 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:49 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:49 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:49 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:49 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:49 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:49 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:49 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:50 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:50 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:50 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:50 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:50 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:50 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:51 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:51 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:51 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:51 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:51 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:51 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:51 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:32:51 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:52 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:52 executing program 0: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:52 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:52 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:53 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:53 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:53 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:53 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:53 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:54 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:54 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:54 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:54 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:54 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:54 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:55 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:55 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:55 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:55 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:55 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:55 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:56 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:56 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:56 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:56 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:56 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:56 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:56 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:57 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:57 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:57 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:57 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:57 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:57 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:57 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:57 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:57 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:58 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:58 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:58 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 06:32:58 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2240.408693] audit: type=1326 audit(1537079578.418:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28769 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:58 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:58 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:58 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:59 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:59 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:32:59 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2241.377858] audit: type=1326 audit(1537079579.385:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28787 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:32:59 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:32:59 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:32:59 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:00 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:00 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:00 executing program 0: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 2242.428832] audit: type=1326 audit(1537079580.438:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28805 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:00 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:00 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:00 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:01 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:01 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:01 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:01 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:01 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r0, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:01 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:02 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:02 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:02 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:02 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:02 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r0, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:02 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:03 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:03 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:03 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:03 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:03 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r0, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:03 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:04 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:04 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:04 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:04 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:04 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:04 executing program 1: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r1, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:04 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:04 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:05 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r0, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:05 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:05 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:06 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:06 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:06 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:06 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(r0, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:06 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:06 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:07 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:07 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:07 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:07 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff01}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:07 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:07 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:08 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:08 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:08 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:08 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:08 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:08 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:09 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:09 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:09 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:09 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:09 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:09 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:10 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:10 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:10 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:10 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:10 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:10 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:10 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:10 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:11 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:11 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:11 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:11 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:11 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:11 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:11 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:11 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:11 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:11 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:12 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2253.940683] audit: type=1326 audit(1537079591.950:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29045 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:12 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:12 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:12 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:12 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:12 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2254.886889] audit: type=1326 audit(1537079592.897:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29061 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:12 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:13 executing program 3: getrusage(0x0, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:13 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:13 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:13 executing program 1: creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='smaps_rollup\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000005c0)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="c12d13dd81615d57f2acff4913f5ded4", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb69") 06:33:13 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2255.839254] audit: type=1326 audit(1537079593.849:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29078 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:13 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:14 executing program 3: getrusage(0x0, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:14 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:14 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:14 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:14 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:14 executing program 4: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:15 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:15 executing program 3: getrusage(0x0, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:15 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:15 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:15 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:15 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:16 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:16 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:16 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:16 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:16 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:16 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:17 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:17 executing program 5: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:17 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:17 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:17 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:17 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:17 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 5: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:18 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:18 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:18 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 5: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:19 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:19 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:20 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:20 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:21 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:21 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:21 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:21 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:21 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2263.204238] audit: type=1326 audit(1537079601.212:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29272 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:21 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2263.453338] audit: type=1326 audit(1537079601.460:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29281 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:21 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:21 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:22 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:22 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:22 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2264.210730] audit: type=1326 audit(1537079602.218:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29293 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:22 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2264.407836] audit: type=1326 audit(1537079602.417:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29300 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:22 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:22 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2265.169504] audit: type=1326 audit(1537079603.179:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29312 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:23 executing program 3: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2265.326046] audit: type=1326 audit(1537079603.335:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29318 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:23 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:23 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:23 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:24 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:24 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:24 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:25 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:25 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:25 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:25 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2267.229765] audit: type=1326 audit(1537079605.238:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29372 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:25 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:25 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:25 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:26 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:26 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2268.204216] audit: type=1326 audit(1537079606.214:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29390 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:26 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:26 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:26 executing program 0: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:26 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:27 executing program 5: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:27 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 2269.164310] audit: type=1326 audit(1537079607.172:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29405 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:33:27 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:27 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:27 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:27 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:27 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:27 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 06:33:27 executing program 0: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:27 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:27 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:27 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:28 executing program 5 (fault-call:0 fault-nth:0): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2270.116398] FAULT_INJECTION: forcing a failure. [ 2270.116398] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.127835] CPU: 1 PID: 29442 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2270.135160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.144542] Call Trace: [ 2270.147200] dump_stack+0x14b/0x190 [ 2270.150927] should_fail+0xa98/0xaa0 [ 2270.154715] __should_failslab+0x278/0x2a0 [ 2270.159037] should_failslab+0x29/0x70 [ 2270.162982] kmem_cache_alloc+0x127/0xb20 [ 2270.167182] ? __anon_vma_prepare+0xc5/0xb40 [ 2270.171650] ? rcu_all_qs+0x2e/0x1f0 [ 2270.175475] __anon_vma_prepare+0xc5/0xb40 [ 2270.179799] ? do_huge_pmd_anonymous_page+0x82/0x27e0 [ 2270.185067] ? handle_mm_fault+0x4377/0x81b0 [ 2270.189560] do_huge_pmd_anonymous_page+0x42a/0x27e0 [ 2270.194743] ? kmsan_set_origin_inline+0x6b/0x120 [ 2270.199652] handle_mm_fault+0x4377/0x81b0 [ 2270.203948] ? kmsan_set_origin_inline+0x6b/0x120 [ 2270.208865] __do_page_fault+0xc8b/0x17e0 [ 2270.213125] do_page_fault+0x98/0xd0 [ 2270.216973] page_fault+0x1e/0x30 [ 2270.220509] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2270.226456] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2270.245402] RSP: 0018:ffff88019fdcfdb8 EFLAGS: 00010206 [ 2270.250820] RAX: ffffffff8431dcdb RBX: ffff880108024400 RCX: 0000000000000090 [ 2270.258127] RDX: 0000000000000090 RSI: ffff88019fdcfe40 RDI: 00000000200009c0 [ 2270.265426] RBP: ffff88019fdcfe30 R08: 0000000000000000 R09: 0000000000000002 [ 2270.272741] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2270.280046] R13: ffff88019fdcfe40 R14: 0000000000000090 R15: 0000000000000000 [ 2270.287397] ? getrusage+0x20c0/0x20c0 [ 2270.291374] ? _copy_to_user+0xcb/0x1f0 [ 2270.295398] ? _copy_to_user+0x10f/0x1f0 [ 2270.299568] __se_sys_getrusage+0x114/0x1c0 [ 2270.303972] __x64_sys_getrusage+0x3e/0x60 [ 2270.308299] do_syscall_64+0xb8/0x100 [ 2270.312147] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2270.317369] RIP: 0033:0x4572d9 [ 2270.320605] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2270.339549] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2270.347313] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2270.354632] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff 06:33:28 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:28 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2270.361954] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.369262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2270.376583] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000000 06:33:28 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:28 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:28 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:28 executing program 0: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:28 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:28 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:28 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:29 executing program 5 (fault-call:0 fault-nth:1): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2271.288115] FAULT_INJECTION: forcing a failure. [ 2271.288115] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.299695] CPU: 0 PID: 29473 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2271.307010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2271.316399] Call Trace: [ 2271.319054] dump_stack+0x14b/0x190 [ 2271.322763] should_fail+0xa98/0xaa0 [ 2271.326533] __should_failslab+0x278/0x2a0 [ 2271.330849] should_failslab+0x29/0x70 [ 2271.334789] kmem_cache_alloc+0x127/0xb20 [ 2271.339004] ? __anon_vma_prepare+0x1e0/0xb40 [ 2271.343539] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2271.348973] ? find_mergeable_anon_vma+0x522/0xce0 [ 2271.353982] __anon_vma_prepare+0x1e0/0xb40 [ 2271.358387] ? do_huge_pmd_anonymous_page+0x82/0x27e0 [ 2271.363672] ? handle_mm_fault+0x4377/0x81b0 [ 2271.368179] do_huge_pmd_anonymous_page+0x42a/0x27e0 [ 2271.373379] ? kmsan_set_origin_inline+0x6b/0x120 [ 2271.378290] handle_mm_fault+0x4377/0x81b0 [ 2271.382572] ? kmsan_set_origin_inline+0x6b/0x120 [ 2271.387485] __do_page_fault+0xc8b/0x17e0 [ 2271.391752] do_page_fault+0x98/0xd0 [ 2271.395542] page_fault+0x1e/0x30 [ 2271.399072] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2271.405524] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2271.424468] RSP: 0018:ffff880155d7fdb8 EFLAGS: 00010206 [ 2271.429875] RAX: ffffffff8431dcdb RBX: ffff880109690900 RCX: 0000000000000090 [ 2271.437201] RDX: 0000000000000090 RSI: ffff880155d7fe40 RDI: 00000000200009c0 [ 2271.444497] RBP: ffff880155d7fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2271.451807] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2271.459107] R13: ffff880155d7fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2271.466427] ? getrusage+0x20c0/0x20c0 [ 2271.471342] ? _copy_to_user+0xcb/0x1f0 [ 2271.475364] ? _copy_to_user+0x10f/0x1f0 [ 2271.479512] __se_sys_getrusage+0x114/0x1c0 [ 2271.483899] __x64_sys_getrusage+0x3e/0x60 [ 2271.488197] do_syscall_64+0xb8/0x100 [ 2271.492044] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2271.497266] RIP: 0033:0x4572d9 [ 2271.500510] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2271.519453] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2271.527208] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 06:33:29 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2271.534514] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2271.542192] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.549497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2271.556795] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000001 06:33:29 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:29 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:29 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:29 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 5 (fault-call:0 fault-nth:2): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2272.372490] FAULT_INJECTION: forcing a failure. [ 2272.372490] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.383924] CPU: 1 PID: 29497 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2272.391313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.400749] Call Trace: [ 2272.403395] dump_stack+0x14b/0x190 [ 2272.407192] should_fail+0xa98/0xaa0 [ 2272.411047] __should_failslab+0x278/0x2a0 [ 2272.415367] should_failslab+0x29/0x70 [ 2272.419303] kmem_cache_alloc+0x127/0xb20 [ 2272.423533] ? __khugepaged_enter+0xa8/0x790 [ 2272.428022] ? __msan_poison_alloca+0x173/0x1f0 [ 2272.432740] ? __khugepaged_enter+0x42/0x790 [ 2272.437236] __khugepaged_enter+0xa8/0x790 [ 2272.441557] do_huge_pmd_anonymous_page+0x528/0x27e0 [ 2272.446735] ? kmsan_set_origin_inline+0x6b/0x120 [ 2272.451646] handle_mm_fault+0x4377/0x81b0 [ 2272.455922] ? kmsan_set_origin_inline+0x6b/0x120 [ 2272.460836] __do_page_fault+0xc8b/0x17e0 [ 2272.465079] do_page_fault+0x98/0xd0 [ 2272.468874] page_fault+0x1e/0x30 [ 2272.472368] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2272.478303] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2272.497237] RSP: 0018:ffff880155f6fdb8 EFLAGS: 00010206 [ 2272.502661] RAX: ffffffff8431dcdb RBX: ffff880108024400 RCX: 0000000000000090 [ 2272.510474] RDX: 0000000000000090 RSI: ffff880155f6fe40 RDI: 00000000200009c0 [ 2272.517780] RBP: ffff880155f6fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2272.525079] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2272.532386] R13: ffff880155f6fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2272.539723] ? getrusage+0x20c0/0x20c0 [ 2272.543660] ? _copy_to_user+0xcb/0x1f0 [ 2272.547696] ? _copy_to_user+0x10f/0x1f0 [ 2272.551854] __se_sys_getrusage+0x114/0x1c0 [ 2272.556238] __x64_sys_getrusage+0x3e/0x60 [ 2272.560519] do_syscall_64+0xb8/0x100 [ 2272.564376] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2272.569611] RIP: 0033:0x4572d9 [ 2272.572849] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.591795] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2272.599559] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2272.606873] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2272.614190] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 06:33:30 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2272.621485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2272.628791] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000002 06:33:30 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:30 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:31 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:31 executing program 5 (fault-call:0 fault-nth:3): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:31 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2273.475431] FAULT_INJECTION: forcing a failure. [ 2273.475431] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2273.487743] CPU: 0 PID: 29523 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2273.495058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2273.504437] Call Trace: [ 2273.507085] dump_stack+0x14b/0x190 [ 2273.510760] should_fail+0xa98/0xaa0 [ 2273.514524] __alloc_pages_nodemask+0x5db/0x5c80 [ 2273.519334] ? kmsan_set_origin_inline+0x6b/0x120 [ 2273.524223] ? __msan_poison_alloca+0x173/0x1f0 [ 2273.528976] ? should_fail+0x53/0xaa0 [ 2273.532844] ? __should_failslab+0x278/0x2a0 [ 2273.537326] ? kmsan_set_origin_inline+0x6b/0x120 [ 2273.542225] ? __msan_poison_alloca+0x173/0x1f0 [ 2273.546967] alloc_pages_vma+0x1578/0x1830 [ 2273.551300] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 2273.556479] ? kmsan_set_origin_inline+0x6b/0x120 [ 2273.561380] handle_mm_fault+0x4377/0x81b0 [ 2273.565651] ? kmsan_set_origin_inline+0x6b/0x120 [ 2273.570565] __do_page_fault+0xc8b/0x17e0 [ 2273.574808] do_page_fault+0x98/0xd0 [ 2273.578593] page_fault+0x1e/0x30 [ 2273.582092] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2273.588014] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2273.606961] RSP: 0018:ffff880155f8fdb8 EFLAGS: 00010206 [ 2273.612360] RAX: ffffffff8431dcdb RBX: ffff880108020900 RCX: 0000000000000090 [ 2273.619680] RDX: 0000000000000090 RSI: ffff880155f8fe40 RDI: 00000000200009c0 [ 2273.626985] RBP: ffff880155f8fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2273.634298] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2273.641599] R13: ffff880155f8fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2273.648928] ? getrusage+0x20c0/0x20c0 [ 2273.652858] ? _copy_to_user+0xcb/0x1f0 [ 2273.656879] ? _copy_to_user+0x10f/0x1f0 [ 2273.661041] __se_sys_getrusage+0x114/0x1c0 [ 2273.665422] __x64_sys_getrusage+0x3e/0x60 [ 2273.669696] do_syscall_64+0xb8/0x100 [ 2273.673537] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2273.678771] RIP: 0033:0x4572d9 [ 2273.682007] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2273.700952] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2273.708699] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2273.715995] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff 06:33:31 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2273.723295] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2273.730594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2273.737893] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000003 06:33:31 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:31 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:32 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:32 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:32 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:32 executing program 5 (fault-call:0 fault-nth:4): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:32 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2274.414653] FAULT_INJECTION: forcing a failure. [ 2274.414653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2274.426723] CPU: 0 PID: 29547 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2274.434018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2274.443381] Call Trace: [ 2274.446008] dump_stack+0x14b/0x190 [ 2274.449672] should_fail+0xa98/0xaa0 [ 2274.453433] __alloc_pages_nodemask+0x5db/0x5c80 [ 2274.458221] ? msan_get_shadow_origin_ptr+0xaf/0x2e0 [ 2274.463364] ? kernel_poison_pages+0x1a0/0x360 [ 2274.467987] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2274.473503] ? get_page_from_freelist+0xae35/0xb8b0 [ 2274.478579] ? task_kmsan_context_state+0x5e/0x110 [ 2274.483557] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2274.488964] ? __module_address+0x6a/0x600 [ 2274.493231] ? task_kmsan_context_state+0x5e/0x110 [ 2274.498203] ? __module_address+0x6a/0x600 [ 2274.502500] ? task_kmsan_context_state+0x5e/0x110 [ 2274.507490] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 06:33:32 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2274.513440] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 2274.518974] kmsan_alloc_page+0x75/0xd0 [ 2274.522998] __alloc_pages_nodemask+0xf6b/0x5c80 [ 2274.527786] ? kmsan_set_origin_inline+0x6b/0x120 [ 2274.532675] ? __msan_poison_alloca+0x173/0x1f0 [ 2274.537383] ? should_fail+0x53/0xaa0 [ 2274.541224] ? __should_failslab+0x278/0x2a0 [ 2274.545673] ? kmsan_set_origin_inline+0x6b/0x120 [ 2274.550598] alloc_pages_vma+0x1578/0x1830 [ 2274.554893] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 2274.560043] ? kmsan_set_origin_inline+0x6b/0x120 [ 2274.564957] handle_mm_fault+0x4377/0x81b0 [ 2274.569229] ? kmsan_set_origin_inline+0x6b/0x120 [ 2274.574157] __do_page_fault+0xc8b/0x17e0 [ 2274.578364] do_page_fault+0x98/0xd0 [ 2274.582108] page_fault+0x1e/0x30 [ 2274.585598] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2274.591508] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2274.610431] RSP: 0018:ffff880156d2fdb8 EFLAGS: 00010206 [ 2274.615820] RAX: ffffffff8431dcdb RBX: ffff880108020900 RCX: 0000000000000090 [ 2274.623114] RDX: 0000000000000090 RSI: ffff880156d2fe40 RDI: 00000000200009c0 [ 2274.630407] RBP: ffff880156d2fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2274.637695] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2274.645000] R13: ffff880156d2fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2274.652308] ? getrusage+0x20c0/0x20c0 [ 2274.656228] ? _copy_to_user+0xcb/0x1f0 [ 2274.660237] ? _copy_to_user+0x10f/0x1f0 [ 2274.664347] __se_sys_getrusage+0x114/0x1c0 [ 2274.668761] __x64_sys_getrusage+0x3e/0x60 [ 2274.673035] do_syscall_64+0xb8/0x100 [ 2274.676869] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2274.682075] RIP: 0033:0x4572d9 [ 2274.685290] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2274.704216] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2274.711957] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2274.719249] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2274.726538] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2274.733828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2274.741118] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000004 06:33:32 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:32 executing program 2: getrusage(0x0, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:32 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:33 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:33 executing program 5 (fault-call:0 fault-nth:5): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2275.665252] FAULT_INJECTION: forcing a failure. [ 2275.665252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2275.677155] CPU: 1 PID: 29567 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2275.684475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2275.693841] Call Trace: [ 2275.696466] dump_stack+0x14b/0x190 [ 2275.700135] should_fail+0xa98/0xaa0 [ 2275.703904] __alloc_pages_nodemask+0x5db/0x5c80 [ 2275.708701] ? kernel_poison_pages+0x1a0/0x360 [ 2275.713331] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2275.718807] ? get_page_from_freelist+0xae35/0xb8b0 [ 2275.723863] ? task_kmsan_context_state+0x5e/0x110 [ 2275.728824] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2275.734220] ? __module_address+0x6a/0x600 [ 2275.738495] ? task_kmsan_context_state+0x5e/0x110 [ 2275.743492] ? task_kmsan_context_state+0x5e/0x110 [ 2275.748485] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 2275.754253] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 2275.759782] kmsan_alloc_page+0x75/0xd0 [ 2275.763805] __alloc_pages_nodemask+0xf6b/0x5c80 [ 2275.768599] ? kmsan_set_origin_inline+0x6b/0x120 [ 2275.773489] ? __msan_poison_alloca+0x173/0x1f0 [ 2275.778195] ? should_fail+0x53/0xaa0 [ 2275.782025] ? __should_failslab+0x278/0x2a0 [ 2275.786469] ? kmsan_set_origin_inline+0x6b/0x120 [ 2275.791394] alloc_pages_vma+0x1578/0x1830 [ 2275.795683] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 2275.800821] ? kmsan_set_origin_inline+0x6b/0x120 [ 2275.805735] handle_mm_fault+0x4377/0x81b0 [ 2275.810000] ? kmsan_set_origin_inline+0x6b/0x120 [ 2275.814908] __do_page_fault+0xc8b/0x17e0 [ 2275.819118] do_page_fault+0x98/0xd0 [ 2275.822870] page_fault+0x1e/0x30 [ 2275.826353] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2275.832258] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2275.851178] RSP: 0018:ffff88002af0fdb8 EFLAGS: 00010206 [ 2275.856569] RAX: ffffffff8431dcdb RBX: ffff880108020900 RCX: 0000000000000090 [ 2275.863862] RDX: 0000000000000090 RSI: ffff88002af0fe40 RDI: 00000000200009c0 [ 2275.871150] RBP: ffff88002af0fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2275.878454] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2275.885740] R13: ffff88002af0fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2275.893066] ? getrusage+0x20c0/0x20c0 [ 2275.896983] ? _copy_to_user+0xcb/0x1f0 [ 2275.901009] ? _copy_to_user+0x10f/0x1f0 [ 2275.905122] __se_sys_getrusage+0x114/0x1c0 [ 2275.909505] __x64_sys_getrusage+0x3e/0x60 [ 2275.913786] do_syscall_64+0xb8/0x100 [ 2275.917628] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2275.922839] RIP: 0033:0x4572d9 [ 2275.926054] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2275.945013] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2275.952749] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 06:33:34 executing program 2: getrusage(0x0, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:34 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:34 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2275.960037] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2275.967327] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.974614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2275.981900] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000005 06:33:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:34 executing program 5 (fault-call:0 fault-nth:6): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:35 executing program 2: getrusage(0x0, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2276.974075] FAULT_INJECTION: forcing a failure. [ 2276.974075] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2276.986112] CPU: 0 PID: 29582 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2276.993422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.002804] Call Trace: [ 2277.005461] dump_stack+0x14b/0x190 [ 2277.009141] should_fail+0xa98/0xaa0 [ 2277.012963] __alloc_pages_nodemask+0x5db/0x5c80 [ 2277.017785] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2277.023199] ? try_charge+0x2622/0x2f10 [ 2277.027220] ? __msan_poison_alloca+0x173/0x1f0 [ 2277.031980] ? __should_failslab+0x278/0x2a0 [ 2277.036492] alloc_pages_current+0x6b1/0x970 [ 2277.041002] pte_alloc_one+0x5a/0x1a0 [ 2277.044885] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 2277.050060] handle_mm_fault+0x4377/0x81b0 [ 2277.054343] ? kmsan_set_origin_inline+0x6b/0x120 [ 2277.059256] __do_page_fault+0xc8b/0x17e0 [ 2277.063492] do_page_fault+0x98/0xd0 [ 2277.067277] page_fault+0x1e/0x30 [ 2277.070777] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2277.076709] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2277.095645] RSP: 0018:ffff88002af0fdb8 EFLAGS: 00010206 [ 2277.101058] RAX: ffffffff8431dcdb RBX: ffff880109690900 RCX: 0000000000000090 [ 2277.108355] RDX: 0000000000000090 RSI: ffff88002af0fe40 RDI: 00000000200009c0 [ 2277.115652] RBP: ffff88002af0fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2277.122958] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2277.130257] R13: ffff88002af0fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2277.137581] ? getrusage+0x20c0/0x20c0 [ 2277.141520] ? _copy_to_user+0xcb/0x1f0 [ 2277.145678] ? _copy_to_user+0x10f/0x1f0 [ 2277.149846] __se_sys_getrusage+0x114/0x1c0 [ 2277.154223] __x64_sys_getrusage+0x3e/0x60 [ 2277.158496] do_syscall_64+0xb8/0x100 [ 2277.162342] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2277.167564] RIP: 0033:0x4572d9 [ 2277.170801] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2277.189735] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2277.197484] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2277.204788] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2277.212097] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2277.219398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2277.226726] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000006 [ 2277.743329] device bridge_slave_1 left promiscuous mode [ 2277.749259] bridge0: port 2(bridge_slave_1) entered disabled state [ 2277.761194] device bridge_slave_0 left promiscuous mode [ 2277.766991] bridge0: port 1(bridge_slave_0) entered disabled state [ 2277.814971] team0 (unregistering): Port device team_slave_1 removed [ 2277.828749] team0 (unregistering): Port device team_slave_0 removed [ 2277.844886] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2277.856886] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2277.880679] bond0 (unregistering): Released all slaves 06:33:35 executing program 0: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:35 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:35 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:35 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:35 executing program 5 (fault-call:0 fault-nth:7): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:35 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2278.011841] FAULT_INJECTION: forcing a failure. [ 2278.011841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2278.023708] CPU: 1 PID: 29603 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2278.030999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.040362] Call Trace: [ 2278.042984] dump_stack+0x14b/0x190 [ 2278.046648] should_fail+0xa98/0xaa0 [ 2278.050413] __alloc_pages_nodemask+0x5db/0x5c80 [ 2278.055211] ? kernel_poison_pages+0x1a0/0x360 [ 2278.059831] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2278.065346] ? get_page_from_freelist+0xae35/0xb8b0 [ 2278.070402] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2278.075801] ? update_load_avg+0x6c4/0x1a00 [ 2278.080179] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2278.085660] ? rb_erase_cached+0xbe3/0x2c60 [ 2278.090019] ? kmsan_set_origin_inline+0x6b/0x120 [ 2278.094933] ? try_charge+0x14c/0x2f10 [ 2278.098863] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 2278.104606] ? kmsan_alloc_page+0x75/0xd0 [ 2278.108825] ? kmsan_set_origin_inline+0x6b/0x120 [ 2278.113716] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2278.119127] ? memcg_kmem_charge+0x7a4/0xd10 [ 2278.123566] kmsan_alloc_page+0x75/0xd0 [ 2278.127578] __alloc_pages_nodemask+0xf6b/0x5c80 [ 2278.132377] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2278.137771] ? try_charge+0x2622/0x2f10 [ 2278.141800] ? __msan_poison_alloca+0x173/0x1f0 [ 2278.146502] ? __should_failslab+0x278/0x2a0 [ 2278.150999] alloc_pages_current+0x6b1/0x970 [ 2278.155454] pte_alloc_one+0x5a/0x1a0 [ 2278.159285] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 2278.164447] handle_mm_fault+0x4377/0x81b0 [ 2278.168705] ? kmsan_set_origin_inline+0x6b/0x120 [ 2278.173612] __do_page_fault+0xc8b/0x17e0 [ 2278.177814] do_page_fault+0x98/0xd0 [ 2278.181561] page_fault+0x1e/0x30 [ 2278.185045] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2278.190955] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2278.209875] RSP: 0018:ffff88013a2cfdb8 EFLAGS: 00010206 [ 2278.215283] RAX: ffffffff8431dcdb RBX: ffff880108024400 RCX: 0000000000000090 [ 2278.222574] RDX: 0000000000000090 RSI: ffff88013a2cfe40 RDI: 00000000200009c0 [ 2278.229862] RBP: ffff88013a2cfe30 R08: 0000000000000000 R09: 0000000000000002 [ 2278.237145] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2278.244427] R13: ffff88013a2cfe40 R14: 0000000000000090 R15: 0000000000000000 [ 2278.251735] ? getrusage+0x20c0/0x20c0 [ 2278.255644] ? _copy_to_user+0xcb/0x1f0 [ 2278.259643] ? _copy_to_user+0x10f/0x1f0 [ 2278.263737] __se_sys_getrusage+0x114/0x1c0 [ 2278.268102] __x64_sys_getrusage+0x3e/0x60 [ 2278.272363] do_syscall_64+0xb8/0x100 [ 2278.276184] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2278.281391] RIP: 0033:0x4572d9 [ 2278.284621] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.303533] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2278.311277] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2278.318559] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2278.325845] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2278.333145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2278.340448] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000007 06:33:36 executing program 1: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:36 executing program 3: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") 06:33:36 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:36 executing program 2: getrusage(0x2003, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b7440f4986fcffffff71fb0703") [ 2279.060053] IPVS: ftp: loaded support on port[0] = 21 06:33:37 executing program 5 (fault-call:0 fault-nth:8): getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2279.341811] FAULT_INJECTION: forcing a failure. [ 2279.341811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2279.353681] CPU: 0 PID: 29627 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #48 [ 2279.360977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.370342] Call Trace: [ 2279.372964] dump_stack+0x14b/0x190 [ 2279.376637] should_fail+0xa98/0xaa0 [ 2279.380392] __alloc_pages_nodemask+0x5db/0x5c80 [ 2279.385203] ? kernel_poison_pages+0x1a0/0x360 [ 2279.389828] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2279.395304] ? get_page_from_freelist+0xae35/0xb8b0 [ 2279.400828] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2279.406216] ? update_load_avg+0x6c4/0x1a00 [ 2279.410566] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 2279.416045] ? rb_erase_cached+0xbe3/0x2c60 [ 2279.420425] ? kmsan_set_origin_inline+0x6b/0x120 [ 2279.425328] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 2279.431073] ? kmsan_alloc_page+0x75/0xd0 [ 2279.435284] ? kmsan_set_origin_inline+0x6b/0x120 [ 2279.440175] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2279.445566] ? memcg_kmem_charge+0x7a4/0xd10 [ 2279.450012] kmsan_alloc_page+0x75/0xd0 [ 2279.454023] __alloc_pages_nodemask+0xf6b/0x5c80 [ 2279.458822] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 2279.464218] ? try_charge+0x2622/0x2f10 [ 2279.468217] ? __msan_poison_alloca+0x173/0x1f0 [ 2279.472938] ? __should_failslab+0x278/0x2a0 [ 2279.477440] alloc_pages_current+0x6b1/0x970 [ 2279.481909] pte_alloc_one+0x5a/0x1a0 [ 2279.485775] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 2279.490953] handle_mm_fault+0x4377/0x81b0 [ 2279.495221] ? kmsan_set_origin_inline+0x6b/0x120 [ 2279.500136] __do_page_fault+0xc8b/0x17e0 [ 2279.504340] do_page_fault+0x98/0xd0 [ 2279.508091] page_fault+0x1e/0x30 [ 2279.511581] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 2279.517496] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 2279.536430] RSP: 0018:ffff88008d66fdb8 EFLAGS: 00010206 [ 2279.541834] RAX: ffffffff8431dcdb RBX: ffff880109692680 RCX: 0000000000000090 [ 2279.549133] RDX: 0000000000000090 RSI: ffff88008d66fe40 RDI: 00000000200009c0 [ 2279.556419] RBP: ffff88008d66fe30 R08: 0000000000000000 R09: 0000000000000002 [ 2279.563711] R10: 0000000000000000 R11: ffffffff81297fe0 R12: 00000000200009c0 [ 2279.571001] R13: ffff88008d66fe40 R14: 0000000000000090 R15: 0000000000000000 [ 2279.578333] ? getrusage+0x20c0/0x20c0 [ 2279.582251] ? _copy_to_user+0xcb/0x1f0 [ 2279.586259] ? _copy_to_user+0x10f/0x1f0 [ 2279.590371] __se_sys_getrusage+0x114/0x1c0 [ 2279.594744] __x64_sys_getrusage+0x3e/0x60 [ 2279.599019] do_syscall_64+0xb8/0x100 [ 2279.602849] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2279.608063] RIP: 0033:0x4572d9 [ 2279.611282] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2279.630206] RSP: 002b:00007ff7c26fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000062 [ 2279.637947] RAX: ffffffffffffffda RBX: 00007ff7c26fe6d4 RCX: 00000000004572d9 [ 2279.645243] RDX: 0000000000000000 RSI: 00000000200009c0 RDI: ffffffffffffffff [ 2279.652546] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.659839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2279.667130] R13: 00000000004cc958 R14: 00000000004c3c62 R15: 0000000000000008 06:33:37 executing program 1: getrusage(0x0, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 06:33:37 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") [ 2281.195639] bridge0: port 1(bridge_slave_0) entered blocking state [ 2281.202117] bridge0: port 1(bridge_slave_0) entered disabled state [ 2281.209851] device bridge_slave_0 entered promiscuous mode [ 2281.257308] bridge0: port 2(bridge_slave_1) entered blocking state [ 2281.263717] bridge0: port 2(bridge_slave_1) entered disabled state [ 2281.271246] device bridge_slave_1 entered promiscuous mode [ 2281.317135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2281.366503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2281.512732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2281.564174] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2281.787317] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2281.794882] team0: Port device team_slave_0 added [ 2281.841196] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2281.848686] team0: Port device team_slave_1 added [ 2281.895180] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2281.944980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2281.993363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2282.000788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2282.009684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2282.054092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2282.061323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2282.069919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2282.564749] bridge0: port 2(bridge_slave_1) entered blocking state [ 2282.571177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2282.578011] bridge0: port 1(bridge_slave_0) entered blocking state [ 2282.584426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2282.592705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2282.987678] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2284.444069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2284.616393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2284.788488] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2284.794805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2284.803341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2284.974153] 8021q: adding VLAN 0 to HW filter on device team0 2018/09/16 06:33:44 executor 0 failed 0 times: executor 0: failed: net.ipv6.conf.syz_tun.accept_dad = 0 net.ipv6.conf.syz_tun.router_solicitations = 0 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument iptable checkpoint filter/2: getsockopt(IPT_SO_GET_INFO) (errno 17) loop failed (errno 0) [ 2286.412000] ------------[ cut here ]------------ [ 2286.416824] kernel BUG at mm/kmsan/kmsan_hooks.c:268! [ 2286.422177] invalid opcode: 0000 [#1] SMP PTI [ 2286.426728] CPU: 1 PID: 4314 Comm: syz-fuzzer Not tainted 4.19.0-rc3+ #48 [ 2286.433674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.443092] RIP: 0010:kmsan_free_page+0x281/0x2d0 [ 2286.447977] Code: 7d d0 83 c0 ff 41 89 85 f4 08 00 00 75 59 e8 26 81 49 ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 [ 2286.466934] RSP: 0018:ffff8801b376ee40 EFLAGS: 00010286 [ 2286.472594] RAX: 0000000000000082 RBX: ffffea00032c7110 RCX: 0000000000000009 [ 2286.479899] RDX: ffff8801ff814458 RSI: 0000000000000009 RDI: ffffea00032c4000 [ 2286.487217] RBP: ffff8801b376ee88 R08: 0000000000480020 R09: 0000000000000002 [ 2286.494512] R10: 0000000000000000 R11: ffffffff81c47080 R12: 0000000000000200 [ 2286.501812] R13: 0000000000000009 R14: 0000000000000009 R15: ffff8801be014400 [ 2286.509635] FS: 000000c420026068(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 2286.517915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2286.523841] CR2: 00007fff09e45b40 CR3: 0000000009c30000 CR4: 00000000001406e0 [ 2286.531136] Call Trace: [ 2286.533791] ? __free_pages_ok+0x6d/0x16c0 [ 2286.538057] ? free_compound_page+0x8b/0xc0 [ 2286.542414] __free_pages_ok+0x25a/0x16c0 [ 2286.546601] ? kmsan_set_origin_inline+0x6b/0x120 [ 2286.551479] ? __msan_poison_alloca+0x173/0x1f0 [ 2286.556192] free_compound_page+0x8b/0xc0 [ 2286.560397] free_transhuge_page+0x3af/0x460 [ 2286.564854] ? split_huge_page_to_list+0x3500/0x3500 [ 2286.569997] release_pages+0x70c/0x1650 [ 2286.574032] free_pages_and_swap_cache+0x54b/0x570 [ 2286.579099] unmap_page_range+0x37b8/0x4170 [ 2286.583469] ? save_stack_trace+0xa3/0xe0 [ 2286.587693] unmap_single_vma+0x445/0x5e0 [ 2286.591893] unmap_vmas+0x251/0x380 [ 2286.595617] exit_mmap+0x4b7/0x940 [ 2286.599312] ? uprobe_clear_state+0x1ac/0x270 [ 2286.603868] ? __mmput+0x3a/0x5f0 [ 2286.607399] __mmput+0x154/0x5f0 [ 2286.610891] mmput+0xa7/0xe0 [ 2286.614019] exit_mm+0x6dd/0x790 [ 2286.617440] do_exit+0xbf7/0x3890 [ 2286.620954] do_group_exit+0x1a0/0x350 [ 2286.624893] get_signal+0x1425/0x1ef0 [ 2286.628784] do_signal+0x11d/0x2060 [ 2286.632521] ? kmsan_set_origin_inline+0x6b/0x120 [ 2286.637444] ? __msan_poison_alloca+0x173/0x1f0 [ 2286.642193] ? prepare_exit_to_usermode+0x46/0x410 [ 2286.647172] ? syscall_return_slowpath+0xdb/0x700 [ 2286.652099] prepare_exit_to_usermode+0x273/0x410 [ 2286.657046] syscall_return_slowpath+0xdb/0x700 [ 2286.661767] do_syscall_64+0xde/0x100 [ 2286.665615] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 2286.670851] RIP: 0033:0x45d911 [ 2286.674080] Code: Bad RIP value. [ 2286.677474] RSP: 002b:000000c420035f18 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 2286.685220] RAX: fffffffffffffdfe RBX: 000000000000000e RCX: 000000000045d911 [ 2286.692515] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2286.699814] RBP: 000000c420035f28 R08: 000000c420035f18 R09: 0000000000000000 [ 2286.707106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430120 [ 2286.714403] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 2286.721713] Modules linked in: [ 2286.725379] ---[ end trace 2f26134fbdc69c9d ]--- [ 2286.730241] RIP: 0010:kmsan_free_page+0x281/0x2d0 [ 2286.735211] Code: 7d d0 83 c0 ff 41 89 85 f4 08 00 00 75 59 e8 26 81 49 ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 [ 2286.754251] RSP: 0018:ffff8801b376ee40 EFLAGS: 00010286 [ 2286.759720] RAX: 0000000000000082 RBX: ffffea00032c7110 RCX: 0000000000000009 [ 2286.767067] RDX: ffff8801ff814458 RSI: 0000000000000009 RDI: ffffea00032c4000 [ 2286.774478] RBP: ffff8801b376ee88 R08: 0000000000480020 R09: 0000000000000002 [ 2286.781847] R10: 0000000000000000 R11: ffffffff81c47080 R12: 0000000000000200 [ 2286.789221] R13: 0000000000000009 R14: 0000000000000009 R15: ffff8801be014400 [ 2286.796573] FS: 000000c420026068(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 2286.804911] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2286.810911] CR2: 000000000045d8e7 CR3: 0000000009c30000 CR4: 00000000001406e0 [ 2286.818307] Kernel panic - not syncing: Fatal exception [ 2286.824034] Kernel Offset: disabled [ 2286.827700] Rebooting in 86400 seconds..