}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:46 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:46 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:47 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 23:53:47 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:47 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:47 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:47 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:47 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:48 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:48 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:48 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:48 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:48 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:48 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:49 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:49 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:49 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:49 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:49 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:49 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:50 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:50 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:50 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:50 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:50 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:50 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) 23:53:50 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:51 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:51 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:51 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:51 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:51 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) 23:53:51 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:51 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 23:53:51 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:52 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:52 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:52 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 23:53:52 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:52 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:52 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:52 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:52 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:52 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:52 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:52 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:53 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:53 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:53 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:53 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:53 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:53 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:54 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:54 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:54 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:54 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:54 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:54 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:54 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:54 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:54 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:55 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:55 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:55 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:55 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:55 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:55 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:55 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:56 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:56 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:56 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:56 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:56 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:56 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:56 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:57 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:57 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:57 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:57 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:57 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:57 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:58 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:58 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:58 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:58 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:58 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:58 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:59 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:59 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:59 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:53:59 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:53:59 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:53:59 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:53:59 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:00 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:00 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x0, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:00 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x0, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:00 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x0, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:00 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:01 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 355.301750] audit: type=1326 audit(1536882841.688:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8212 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 23:54:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:01 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 355.493086] audit: type=1326 audit(1536882841.888:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8218 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 23:54:02 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x283ffd, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480), &(0x7f00000000c0)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:02 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 355.691913] audit: type=1326 audit(1536882842.078:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8226 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 23:54:02 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:02 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:02 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:02 executing program 1: eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000540)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) geteuid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e00)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getpgrp(0x0) geteuid() getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004d80)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000004d40)='-\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004dc0)) fstat(0xffffffffffffffff, &(0x7f0000004e40)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004ec0)={{{@in6=@remote, @in6=@local}}, {{@in6=@dev}}}, &(0x7f0000004fc0)=0xe8) lstat(&(0x7f0000005000)='./file0\x00', &(0x7f0000005040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000050c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005100)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000005200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575d3450f2e3e3e010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) syz_execute_func(&(0x7f0000000500)="420f0f6f01946969ef69dc00d9f000f200008020d292000000001137370f38211ac46144e2974e2179fb12e5c4a1c9e8dc0f2e1a430f00ce068f0978e3c09f4b") 23:54:02 executing program 1: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) prctl$getreaper(0x0, &(0x7f0000000580)) ustat(0x0, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 23:54:03 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:03 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:03 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:03 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:03 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:03 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) dup(0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002880)={{{@in=@multicast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getresuid(&(0x7f0000002980), &(0x7f00000029c0), &(0x7f0000002a00)) getgid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002b40)=0xe8) getgroups(0x0, &(0x7f0000002b80)) getpgrp(0x0) getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) stat(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000030c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003140)=0xc) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000037c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getgroups(0x0, &(0x7f0000003980)) getpgrp(0x0) stat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003e40)) getuid() getgid() socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000003e80)='vboxnet0self\x00', 0xffffffffffffffff}, 0x30) getuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) geteuid() getresgid(&(0x7f0000004540), &(0x7f0000004580), &(0x7f00000045c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004600), &(0x7f0000004640)=0xc) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getegid() getpgid(0xffffffffffffffff) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getresuid(&(0x7f0000004d40), &(0x7f0000004d80), &(0x7f0000004dc0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000006040)='./file0\x00', &(0x7f0000006080)) lstat(&(0x7f0000006100)='./file0\x00', &(0x7f0000006740)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000061c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006200)={{{@in6, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006340), &(0x7f0000006380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000063c0)) 23:54:03 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:04 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:04 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:04 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:04 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:04 executing program 1: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) prctl$getreaper(0x0, &(0x7f0000000580)) ustat(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 23:54:04 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:04 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:05 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:05 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:05 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:05 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:05 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:05 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:06 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:06 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:06 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:06 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:06 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:06 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:07 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:07 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:07 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:07 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:07 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:07 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:08 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:08 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:08 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:08 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:08 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:08 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:09 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:09 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:09 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:09 executing program 1: clock_gettime(0x0, &(0x7f0000000380)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 23:54:09 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:09 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:09 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:10 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:10 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:10 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:10 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:10 executing program 1: clock_gettime(0x0, &(0x7f0000000380)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 23:54:10 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:11 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:11 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:11 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:11 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:11 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:11 executing program 1: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xaa, 0x29, &(0x7f0000000700)="b90303e6057bb8846427cc1e0800938400cba0af10271e9fa96f6c186a9ba59855f614217d960d9f693250f37414c2013db249b90b568d09fe6f4ae3356116dde91dd73a5201490d09e3b438c188ad532153058235ddfa624c95079749ddb5b2e0f55bc80c01a7834f707184d86ce406a59a59d0e2ac6be38c0201064d2eebb492fee5a7f95076def83f7486601af6d357c501a05779741137c1de0e606214e50b1be64910457162eeb3", &(0x7f0000000140)=""/41, 0x6c}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)=0x1) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) 23:54:12 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:12 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:12 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:12 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:12 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:12 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:13 executing program 1: socket(0x10, 0x1000080003, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000002900)={&(0x7f0000000080)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000580)={0x0, 0xfb, 0x15, 0x0, 0x0, "c257a46febdb386608e66304a6c647f4"}, 0x15, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f00000003c0)) memfd_create(&(0x7f0000000300)="ac30dbbb9cd064426b9642877794a74a14", 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) 23:54:13 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:13 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:13 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:13 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:13 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:14 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:14 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0x10, &(0x7f0000000540)={&(0x7f0000000300)=""/123, 0x7b, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) fsetxattr(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], &(0x7f0000000400)='/dev/loop#\x00', 0xb, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 23:54:14 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:14 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:14 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:14 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:14 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:15 executing program 1: getrusage(0x0, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @remote, @loopback}, &(0x7f00000005c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 23:54:15 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:15 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:15 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:15 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:15 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:16 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:16 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) 23:54:16 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:16 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:16 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:16 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:17 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:17 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:17 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:17 executing program 1: getrusage(0x0, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 23:54:17 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:17 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x1000000000003) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000fc0)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 23:54:17 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:17 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:18 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:18 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:18 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 23:54:18 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:19 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:19 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:19 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:19 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:19 executing program 1: 23:54:20 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:20 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:20 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:20 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:20 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 1: 23:54:20 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:20 executing program 1: 23:54:20 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:20 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:21 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:21 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 1: 23:54:21 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:21 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:21 executing program 1: 23:54:22 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:22 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:22 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:22 executing program 1: 23:54:22 executing program 1: 23:54:22 executing program 1: 23:54:22 executing program 1: 23:54:22 executing program 1: 23:54:22 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:22 executing program 1: 23:54:22 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:22 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:22 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:22 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:22 executing program 1: 23:54:23 executing program 1: 23:54:23 executing program 1: 23:54:23 executing program 1: 23:54:23 executing program 1: 23:54:23 executing program 1: 23:54:23 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:23 executing program 1: 23:54:23 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:23 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:23 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:23 executing program 1: 23:54:23 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:24 executing program 1: 23:54:24 executing program 1: 23:54:24 executing program 1: 23:54:24 executing program 1: 23:54:24 executing program 1: 23:54:24 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:24 executing program 1: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) getpgrp(0x0) getuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:24 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:24 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:24 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:24 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:25 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 23:54:25 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000980)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a", 0x4) 23:54:25 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 23:54:25 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 23:54:25 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 23:54:25 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000a00)='/proc/self/net/pfkey\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000940)) getpgrp(0x0) getpgid(0x0) getpgid(0x0) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000006c0), &(0x7f0000000700)=0x4) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000800), &(0x7f0000000840)=0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000640)) remap_file_pages(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f00000007c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000600)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast2, @loopback}, &(0x7f00000005c0)=0xc) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 1: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) getpgrp(0x0) getuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:20 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:20 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:20 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:20 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:20 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:21 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x0, 0x0) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$llc(0x1a, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000740)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) socketpair$inet(0x2, 0x0, 0x2, &(0x7f0000000780)) getpgrp(0x0) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getgid() socket$nl_generic(0x10, 0x3, 0x10) socket$nl_crypto(0x10, 0x3, 0x15) gettid() getuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) socket$nl_crypto(0x10, 0x3, 0x15) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$usb(&(0x7f0000000940)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) openat$ion(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ion\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000a00)='/dev/input/event#\x00', 0x8, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000b40)=0xe8) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f00000005c0)) sendmsg$netlink(r0, &(0x7f0000000d80)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000002680)=ANY=[]}], 0x1, &(0x7f0000000dc0)=ANY=[@ANYBLOB], 0x0, 0x800}, 0x0) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:21 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:21 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:21 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:21 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:21 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000600)) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0)=[{{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002f40)=""/164, 0xa4}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/181, 0xb5}, {&(0x7f00000040c0)=""/216, 0xd8}], 0x4, &(0x7f00000042c0)=""/17, 0x11}}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80), 0x0, &(0x7f0000005b00)=""/142, 0x8e}}], 0x2, 0x2000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:22 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:22 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 381.983116] hrtimer: interrupt took 31045 ns 03:33:22 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x100fff, 0x0) getuid() getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:33:22 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:22 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:22 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:23 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:23 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:23 executing program 1: getrusage(0x0, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @remote, @loopback}, &(0x7f00000005c0)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003fc0), 0x0, 0x0, &(0x7f0000004080)) recvmsg(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000004300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000005600)}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:33:23 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:23 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:23 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:24 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:24 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:24 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:24 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) sched_setscheduler(r0, 0x400000000005, &(0x7f0000000100)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:33:24 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:24 executing program 1: chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000840)) getgid() getgroups(0x0, &(0x7f0000000900)) getgid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000b00)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000b40), 0x24, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:33:24 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:25 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:25 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:25 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000000), &(0x7f00000000c0)=0x40) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000280)=""/247) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[]}}, 0x0) 03:33:25 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:25 executing program 1: unshare(0x4000000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getpid() 03:33:25 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:25 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:25 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:25 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:26 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:26 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 1: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sysfs$3(0x3) pipe(&(0x7f00000004c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) sched_setscheduler(r0, 0x5, &(0x7f0000000240)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000140)={0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x19, 0xb0}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x15, &(0x7f0000000940)='eth1selinux]vboxnet1\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(0x0, &(0x7f00000003c0)='net/rt_acct\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f0000000dc0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f00000006c0)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) setpgid(0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000540)=""/220, 0xdc}) 03:33:26 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:27 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:27 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:27 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:27 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 387.004288] audit: type=1326 audit(2000000007.230:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9183 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:27 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:27 executing program 1: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x7, 0x0, {{0xd, 'team_slave_0\x00'}}}, 0x1a) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x0, @remote}}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:27 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:27 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:27 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:28 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 387.906921] audit: type=1326 audit(2000000008.130:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9207 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:28 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:28 executing program 1: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) getresuid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f0000000ac0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000e00)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000b80), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e80)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000006c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x360, 0x0, 0x0, 0x0, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x4, &(0x7f0000000240), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000640)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200)='IDLETIMER\x00', 0xffffffffffffffff}, 0x30) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') pselect6(0x40, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000500)={0x77359400}, &(0x7f0000000580)={&(0x7f0000000540), 0x8}) seccomp(0x0, 0x0, &(0x7f0000000c00)={0x0, &(0x7f0000000bc0)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000300)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000000c40)) 03:33:28 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:28 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:28 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000d12000)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) shutdown(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002180), 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:28 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 388.782388] audit: type=1326 audit(2000000009.000:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:29 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:29 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:30 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x15, &(0x7f0000000940)='eth1selinux]vboxnet1\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(0x0, &(0x7f00000003c0)='net/rt_acct\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f0000000dc0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f00000006c0)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) setpgid(0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000540)=""/220, 0xdc}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000b00)=""/244) 03:33:30 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:30 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:30 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400), 0xc, &(0x7f0000000080)={&(0x7f0000001640)=@mpls_getroute={0x1c, 0x1a, 0x101}, 0x1c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000440)="0a692d024e126285718070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:30 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:30 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/246, 0x416}}], 0x1, 0x0, &(0x7f00000044c0)) r3 = dup(r0) ioctl$TUNSETOWNER(r3, 0x400454cc, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000680)={0x14}, 0x14}}, 0x0) close(r1) 03:33:30 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:30 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 390.262554] audit: type=1326 audit(2000000010.480:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9298 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:30 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:30 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:31 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f00000001c0), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getegid() getgid() lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) keyctl$setperm(0x1d, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000400)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) 03:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x11d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x2, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x195) 03:33:31 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 391.033860] kernel msg: ebtables bug: please report to author: entries_size too small 03:33:31 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:31 executing program 4: epoll_create(0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000040)) prctl$getreaper(0x0, &(0x7f0000000580)) ustat(0x0, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") [ 391.084315] kernel msg: ebtables bug: please report to author: entries_size too small 03:33:31 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) [ 391.178616] audit: type=1326 audit(2000000011.400:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9330 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:32 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:32 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:32 executing program 4: keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") prctl$seccomp(0x16, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="27dc28baef5eeffca38aebdb4724dd6b8d35b38912a2799f82c8ddb41ec9d787ddd41988fc32e5d936f432479f6ee5aaa87108000000f64224439b614562b2d471fcc004a20cb9e167d8839ae3d4fe1bc70a43454116f9d6922098c587853129014c9f2f8edb66948c2cfbc1a7b792082b44edf29c675e8ca82702218665f265debc046f1c6d607c6d8b7cdc1ab7aceba725dde2d25fd1efee0a0107dd5c30ba3467b04ffd3dda5d90942c02edcc34007635b7377501ca1e4a972b2c368e57ae8fa37a9b0ee7c83ae37ffbcb47efe6a930a4f4e847626136fcd063522feb81790c5f4648f2c4d60b5db9c92c0200") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x294, &(0x7f0000000080)}, 0x31f68597e45767e9) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001940)) getresgid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000021c0)={{{@in6=@loopback, @in6}}, {{@in6=@ipv4}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000022c0)=0x117) fstat(0xffffffffffffffff, &(0x7f0000002300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000023c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000024c0)=0xe8) getgroups(0x0, &(0x7f0000002500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002cc0)) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) getresuid(&(0x7f0000003140), &(0x7f0000003180), &(0x7f00000031c0)) 03:33:32 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:32 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 392.195851] audit: type=1326 audit(2000000012.420:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9361 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:32 executing program 1: add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffd) socket$inet_udplite(0x2, 0x2, 0x88) ftruncate(0xffffffffffffffff, 0x0) add_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000300), 0x0, 0x0) pipe(&(0x7f00000006c0)) bind$inet6(0xffffffffffffffff, &(0x7f0000000840)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000240)) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:33:32 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:33 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:33 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:33 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x15, &(0x7f0000000940)='eth1selinux]vboxnet1\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(0x0, &(0x7f00000003c0)='net/rt_acct\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f0000000dc0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f00000006c0)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) setpgid(0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x0) 03:33:34 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:34 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:34 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:34 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000b00)="6e67dbba444d600f1368236db47e7074ddc8ed42e92720fd1731929f01ee513998105b1879073d625c7e7ed437314c6edf7254ba21e77822ff6c170cd7d5c96aeafac591cf40f399f844431ae993207dfe5619d0ff2f16c8de3d35131f24e1ab1f1e539d2d2d6dc4c52a8a12f1000343de7e8c96f0d7d3105961e3de3e0d1d0b80ac123f4d1c4d1c649056957e1b9a0bc922ed5bd3986a684d5382d3a49f9589918c300a06dd9d44d0f6392bb6d362b732687fd7927809eeb4c5a2f0604ec1d3df8b415e2517101ee76225b792323679842f9a570f16da7fcb8a1e828df8472cfe7aa1aa0d2cdc6b5cc581016433d32f6c81fb903b9cf146a46d831d80baa0db") pipe(&(0x7f00000006c0)) bind$inet6(0xffffffffffffffff, &(0x7f0000000840)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffe8a) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000005c0)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) fsetxattr(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], &(0x7f0000000400)='/dev/loop#\x00', 0xb, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) 03:33:34 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:34 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:34 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:34 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:35 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000023ec852f4b83b6c87dcc7f87138d56000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x69) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) 03:33:35 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:35 executing program 1: clone(0x200, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000500)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000500)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0x352) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x803102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000580)='./file0\x00', 0x841, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) connect$inet6(r2, &(0x7f0000000040), 0x1c) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 03:33:35 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:35 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:36 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:36 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:36 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:36 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000023ec852f4b83b6c87dcc7f8713"], 0x22) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 03:33:36 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:36 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000004300), 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="2c0271", 0x3}], 0x1, &(0x7f0000000400)=ANY=[]}, 0xc100) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="d09a", 0x2}], 0x1, &(0x7f0000001e40)}, 0x0) [ 396.235542] audit: type=1326 audit(2000000016.460:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9501 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:36 executing program 1: clock_gettime(0x3, &(0x7f0000000440)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x400000000000065, 0x0, &(0x7f0000000080)={0x77359400}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) ustat(0x0, &(0x7f0000000240)) dup(0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000001300)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) 03:33:36 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:36 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 396.590422] audit: type=1326 audit(2000000016.810:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9516 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:36 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:36 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:36 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000740), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) sendto$packet(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2a436e9c388b"}, 0x14) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:37 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:37 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 396.945196] audit: type=1326 audit(2000000017.170:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9532 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:37 executing program 2: mlockall(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@broadcast, @multicast2}, &(0x7f0000000880)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000900)={@remote}, &(0x7f0000000940)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@remote, @remote}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c00)={@local, @dev}, &(0x7f0000000dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@mcast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000011c0)={@multicast1, @local}, &(0x7f0000001200)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000012c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @multicast2, @dev}, &(0x7f0000001340)=0xc) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:37 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000bc0)={0x0, 0x1c9c380}, &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:37 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000bc0)={0x0, 0x1c9c380}, &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) set_tid_address(&(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:37 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:37 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:37 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:38 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:38 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)=@ipv4_newrule={0x38, 0x20, 0x103, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10011}, [@FRA_FLOW={0x8}, @FRA_DST={0x8, 0x1, @rand_addr}, @FRA_GENERIC_POLICY=@FRA_FWMASK={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 03:33:38 executing program 2: 03:33:38 executing program 1: 03:33:38 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:38 executing program 2: 03:33:38 executing program 1: [ 398.105350] audit: type=1326 audit(2000000018.330:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9598 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:38 executing program 2: 03:33:38 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:38 executing program 1: 03:33:38 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:38 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:38 executing program 2: 03:33:38 executing program 1: 03:33:38 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:38 executing program 2: 03:33:39 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:39 executing program 1: 03:33:39 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:39 executing program 2: 03:33:39 executing program 1: 03:33:39 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") [ 398.986652] audit: type=1326 audit(2000000019.210:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9638 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:39 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:39 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:39 executing program 2: 03:33:39 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:39 executing program 1: 03:33:39 executing program 1: 03:33:40 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:40 executing program 2: 03:33:40 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:40 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:40 executing program 1: 03:33:40 executing program 2: [ 399.887504] audit: type=1326 audit(2000000020.110:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9673 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:40 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:40 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:40 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4008ae89, &(0x7f0000000140)={0x2, 0x140}) 03:33:40 executing program 2: 03:33:40 executing program 2: [ 400.343320] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:33:40 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:40 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:40 executing program 2: 03:33:40 executing program 1: 03:33:40 executing program 0: 03:33:40 executing program 1: 03:33:41 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:41 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:41 executing program 2: 03:33:41 executing program 0: 03:33:41 executing program 1: 03:33:41 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:41 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:41 executing program 2: 03:33:41 executing program 1: 03:33:41 executing program 0: 03:33:41 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:41 executing program 0: 03:33:42 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:42 executing program 1: 03:33:42 executing program 2: 03:33:42 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:42 executing program 0: 03:33:42 executing program 0: 03:33:42 executing program 1: 03:33:42 executing program 2: 03:33:42 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:42 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:42 executing program 0: 03:33:42 executing program 2: 03:33:43 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:43 executing program 0: 03:33:43 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:43 executing program 1: 03:33:43 executing program 2: 03:33:43 executing program 1: 03:33:43 executing program 0: 03:33:43 executing program 2: 03:33:43 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:43 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:43 executing program 2: 03:33:43 executing program 1: 03:33:44 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:44 executing program 0: 03:33:44 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:44 executing program 2: 03:33:44 executing program 1: 03:33:44 executing program 0: 03:33:44 executing program 1: [ 403.938986] audit: type=1326 audit(2000000024.160:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9814 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:44 executing program 2: 03:33:44 executing program 0: 03:33:44 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:44 executing program 1: 03:33:44 executing program 2: 03:33:45 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:45 executing program 0: 03:33:45 executing program 2: 03:33:45 executing program 1: 03:33:45 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:45 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:45 executing program 2: [ 404.871074] audit: type=1326 audit(2000000025.090:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9842 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:45 executing program 0: 03:33:45 executing program 1: 03:33:45 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:45 executing program 2: 03:33:45 executing program 1: 03:33:46 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:46 executing program 0: 03:33:46 executing program 2: 03:33:46 executing program 1: 03:33:46 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:46 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:33:46 executing program 0: 03:33:46 executing program 2: 03:33:46 executing program 1: [ 405.841591] audit: type=1326 audit(2000000026.060:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9871 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:46 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:46 executing program 2: 03:33:46 executing program 0: 03:33:46 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:46 executing program 1: 03:33:46 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:46 executing program 0: 03:33:46 executing program 2: 03:33:46 executing program 4: 03:33:46 executing program 0: 03:33:46 executing program 2: 03:33:46 executing program 4: 03:33:46 executing program 1: 03:33:47 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:47 executing program 4: 03:33:47 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:47 executing program 2: 03:33:47 executing program 1: 03:33:47 executing program 0: 03:33:47 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:47 executing program 4: 03:33:47 executing program 2: 03:33:47 executing program 1: 03:33:47 executing program 4: 03:33:47 executing program 0: 03:33:47 executing program 2: prctl$intptr(0x400000000022, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getpgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000180)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:47 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:48 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 03:33:48 executing program 1: prctl$seccomp(0x2c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) socket$unix(0x1, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001180)) open$dir(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f00000012c0)=0x60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getuid() lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002ec0)) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='\x00', &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000031c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) accept4$llc(0xffffffffffffff9c, &(0x7f0000003280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000032c0)=0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:48 executing program 0: memfd_create(&(0x7f0000001540)='\x00', 0x0) rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) pipe2$9p(&(0x7f0000000040), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000001580)={0x14}, 0x14}}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000080), 0xff1c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfeaed98987f") 03:33:48 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 408.469961] audit: type=1326 audit(2000000028.690:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9955 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:48 executing program 4: prctl$intptr(0x400000000034, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getpgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:48 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 408.644526] audit: type=1326 audit(2000000028.870:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9973 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:48 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:49 executing program 2: prctl$intptr(0x40000000002a, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getpgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 408.827284] audit: type=1326 audit(2000000029.050:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9977 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:49 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:49 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:49 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:49 executing program 1: prctl$seccomp(0x2c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) socket$unix(0x1, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001180)) open$dir(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f00000012c0)=0x60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getuid() lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002ec0)) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='\x00', &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000031c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) accept4$llc(0xffffffffffffff9c, &(0x7f0000003280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000032c0)=0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:49 executing program 0: clone(0x200, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000500)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x803102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000580)='./file0\x00', 0x841, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000007540)=[{{&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f0000000780), 0x0, &(0x7f0000000800)}}], 0x1, 0xc040) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) 03:33:49 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:49 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)={0x0, @loopback, 0x0, 0x0, 'fo\x00'}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) msgget$private(0x0, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/152}, 0xa0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:50 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:50 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:50 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:50 executing program 1: prctl$seccomp(0x2c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) socket$unix(0x1, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001180)) open$dir(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f00000012c0)=0x60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getuid() lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002ec0)) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='\x00', &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000031c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) accept4$llc(0xffffffffffffff9c, &(0x7f0000003280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000032c0)=0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:50 executing program 2: getpgid(0x0) dup(0xffffffffffffff9c) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)={0x12, 0x7, 0x0, {0x9, 'children\x00'}}, 0x12) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) set_thread_area(&(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) keyctl$set_reqkey_keyring(0xe, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000940)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 03:33:50 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:50 executing program 4: semget(0x3, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000440)=""/160) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000500), 0x4) fstatfs(0xffffffffffffffff, &(0x7f0000000540)=""/182) accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000006c0)={0x0, &(0x7f0000000680)}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000700)) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f00000007c0)) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000380)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) setns(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='(^mime_type\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) ppoll(&(0x7f0000000240), 0x0, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000002c0), 0x8) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000740)={0x1a, 0x7, 0x0, {{0xd, '/dev/usbmon#\x00'}}}, 0x1a) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000600)={0x18}, 0x18) geteuid() openat$urandom(0xffffffffffffff9c, &(0x7f0000000780)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000180)="c4227d1d1e42c0ca02c4a231aa1e400f381c36c4611d74f066f264440f01d83e2666420f1aed66410fa04799440f0fa80000000097") 03:33:51 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:51 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000240), 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x175, 0x38, 0x0, 0xffffffffffff2cc3, 0x0, 0x20, 0x0, 0x657e}, [{0x0, 0x5ae, 0x0, 0x3, 0x0, 0x10001}], "", [[]]}, 0x158) lseek(r2, 0x4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 03:33:51 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:51 executing program 4: getrusage(0x0, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@dev, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d96235c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") pipe(&(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f0000000940)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f40)={{{@in=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000008a40), 0x0, 0x0, &(0x7f0000008bc0)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008c00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008c40)={0x0, @multicast2, @loopback}, &(0x7f00000002c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008cc0)={@remote}, &(0x7f0000008d00)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000500)=@hci, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008e40)={{{@in, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000008f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009040)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000009140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009240)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000009340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000093c0)=0x13) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009400)={@local}, &(0x7f0000009440)=0x14) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) getpid() 03:33:51 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:51 executing program 1: prctl$seccomp(0x2c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) socket$unix(0x1, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001180)) open$dir(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f00000012c0)=0x60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getuid() lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002ec0)) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='\x00', &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000031c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) accept4$llc(0xffffffffffffff9c, &(0x7f0000003280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000032c0)=0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:51 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r0, 0x80045519, &(0x7f0000000080)) 03:33:51 executing program 2: prctl$intptr(0x40000000001e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getpgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000180)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:51 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) 03:33:51 executing program 0: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01eece41ff0f18370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) getpgid(0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getpgid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rename(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) chroot(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) chroot(&(0x7f0000000200)='./file0\x00') [ 411.698328] kasan: CONFIG_KASAN_INLINE enabled 03:33:51 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000006c0)={'veth1_to_bond\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) tkill(0x0, 0x0) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) set_tid_address(&(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/137) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000040)) [ 411.737092] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 411.812015] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 411.818292] CPU: 1 PID: 10102 Comm: syz-executor0 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 411.826780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.836259] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 411.841277] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 411.860620] RSP: 0018:ffff88013d33f8d8 EFLAGS: 00010206 [ 411.865979] RAX: 0000000000000000 RBX: ffff88013d33f9f8 RCX: 0000000000000006 [ 411.873251] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 411.881051] RBP: ffff88013d33f9c8 R08: ffff88013c4de0c0 R09: fffffbfff12c24e5 [ 411.888320] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013c5e4200 [ 411.895587] R13: 1ffff10027a67f20 R14: 0000000000000000 R15: ffff88013d33fadc [ 411.903318] FS: 00007f1ae4110700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 411.911538] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.917417] CR2: 00007f1ae40eedb8 CR3: 00000001d8f39000 CR4: 00000000001406e0 [ 411.924684] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.932402] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.939697] Call Trace: [ 411.942301] ? user_get_super+0x250/0x250 [ 411.946542] ? down_write+0x8a/0x130 [ 411.950266] ? do_umount_root+0x218/0x320 [ 411.954414] ? down_read+0x120/0x120 [ 411.958133] do_umount_root+0x2b1/0x320 [ 411.962118] ? namespace_unlock+0x210/0x210 [ 411.966543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 411.972611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.978233] ? ns_capable_common+0x13f/0x170 [ 411.982647] ksys_umount+0x8b6/0x1230 [ 411.986480] ? rcu_softirq_qs+0x20/0x20 [ 411.990476] ? dput.part.25+0x241/0x790 [ 411.994515] ? check_preemption_disabled+0x48/0x200 [ 411.999535] ? __detach_mounts+0x430/0x430 [ 412.003767] ? rcu_softirq_qs+0x20/0x20 [ 412.007740] ? mnt_get_count+0x150/0x150 [ 412.011806] ? dput.part.25+0x26d/0x790 [ 412.015778] ? shrink_dcache_sb+0x350/0x350 [ 412.020689] ? current_umask+0x70/0x70 [ 412.024626] ? __x64_sys_futex+0x47f/0x6a0 [ 412.028919] ? do_syscall_64+0x9a/0x820 [ 412.033358] ? do_syscall_64+0x9a/0x820 [ 412.037378] ? lockdep_hardirqs_on+0x421/0x5c0 [ 412.041970] ? trace_hardirqs_on+0xbd/0x310 [ 412.046292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.051670] ? trace_hardirqs_off_caller+0x300/0x300 [ 412.056771] ? ksys_mount+0xa8/0x140 [ 412.060495] __x64_sys_umount+0x54/0x80 [ 412.064470] do_syscall_64+0x1b9/0x820 [ 412.068359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.074183] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.079117] ? trace_hardirqs_off+0x310/0x310 [ 412.083630] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 412.088649] ? recalc_sigpending_tsk+0x180/0x180 [ 412.093454] ? kasan_check_write+0x14/0x20 [ 412.098222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.103086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.108283] RIP: 0033:0x4572d9 [ 412.111491] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.130393] RSP: 002b:00007f1ae410fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 412.138117] RAX: ffffffffffffffda RBX: 00007f1ae41106d4 RCX: 00000000004572d9 [ 412.145893] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 412.153193] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 412.160461] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 412.167725] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000001 [ 412.174999] Modules linked in: 03:33:52 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@mcast1}, &(0x7f0000000940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40), &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0), &(0x7f0000000f00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000f40)=@xdp, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/146, 0x92}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local, @broadcast}, &(0x7f0000001580)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@remote}, &(0x7f0000001840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000029c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f00000001c0), 0xc, &(0x7f0000003140)={&(0x7f0000002a80)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)='+\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='irlan0\x00') ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x0, 0x989680}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f0000000500)='vmnet0nodevcpuset:%/loselinux\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{}, 'syz1\x00'}) 03:33:52 executing program 1: prctl$seccomp(0x2c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) socket$unix(0x1, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001180)) open$dir(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) userfaultfd(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f00000012c0)=0x60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getuid() lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001580)=0xe8) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002ec0)) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='\x00', &(0x7f0000003000)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f00000031c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) accept4$llc(0xffffffffffffff9c, &(0x7f0000003280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000032c0)=0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x1000)=nil) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 412.236723] kobject: 'loop3' (0000000008529137): kobject_uevent_env [ 412.250485] kobject: 'loop3' (0000000008529137): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 412.269078] kobject: 'loop1' (00000000655203d5): kobject_uevent_env [ 412.277798] kobject: 'loop1' (00000000655203d5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 412.311422] ---[ end trace e5f173a4c26f2ef2 ]--- [ 412.321849] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 412.334826] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 412.374936] RSP: 0018:ffff88013d33f8d8 EFLAGS: 00010206 [ 412.386966] RAX: 0000000000000000 RBX: ffff88013d33f9f8 RCX: 0000000000000006 [ 412.403346] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 412.419481] RBP: ffff88013d33f9c8 R08: ffff88013c4de0c0 R09: fffffbfff12c24e5 [ 412.430115] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013c5e4200 [ 412.437936] R13: 1ffff10027a67f20 R14: 0000000000000000 R15: ffff88013d33fadc [ 412.445768] FS: 00007f1ae4110700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 412.454704] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.460716] CR2: ffffffffffffffdc CR3: 00000001d8f39000 CR4: 00000000001406e0 [ 412.469981] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.477521] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.484973] Kernel panic - not syncing: Fatal exception [ 412.491374] Kernel Offset: disabled [ 412.495012] Rebooting in 86400 seconds..