=0xe8) getgroups(0x0, &(0x7f0000004080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000049c0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004ac0)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) fstat(0xffffffffffffffff, &(0x7f0000004b40)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004e80)) fstat(0xffffffffffffffff, &(0x7f0000004ec0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f40), &(0x7f0000004f80)=0xc) getgroups(0x0, &(0x7f0000004fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005000)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000005100)='./file0\x00', &(0x7f0000005140)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000051c0)={{{@in6=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000052c0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005340)={{{@in6=@ipv4, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000005440)=0xe8) getresgid(&(0x7f0000005480), &(0x7f00000054c0), &(0x7f0000005500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005540), &(0x7f0000005580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000055c0)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005a00)) geteuid() getgroups(0x0, &(0x7f0000005a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005ac0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000005bc0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='rpc_pipefs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000, &(0x7f00000009c0)=ANY=[]) 03:33:37 executing program 0: clone(0x635e697f0000, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:37 executing program 5: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="bf16000000000000b707000001000000407000000000e0ff40000000000000009500000200000000"], &(0x7f00000003c0)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x51, &(0x7f0000000140)="000000000500008000a000000000", &(0x7f0000000280)=""/81, 0x8000000052c}, 0x28) 03:33:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='rpc_pipefs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000, &(0x7f00000009c0)=ANY=[]) 03:33:37 executing program 2: clock_gettime(0x8000000b, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000340)={0x90}, 0x90) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:37 executing program 1: setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000540)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/34, &(0x7f0000000440)=0x22) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000200)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='rpc_pipefs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000, &(0x7f00000009c0)=ANY=[]) 03:33:38 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x20003) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000003c0), 0x4) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000340)) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$kcm(0x29, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:38 executing program 0: keyctl$set_reqkey_keyring(0x5, 0x0) request_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) getpgrp(0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'veth0_to_team\x00'}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getegid() syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='rpc_pipefs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000, &(0x7f00000009c0)=ANY=[]) 03:33:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="290000000600000000000000000000000400008e39a97e00030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a0c2f1e19cc826b23ce090bcf125dccadf0ffe7f2e16407a9b16114877766ec975e07ec1e5f8e2f6f7beef374d3f0acaffa7bb8b418334ac04f022460441cd47c1493d28977966c43138490e7dd6688f4bb8de6cc7dfb199a95f7f5a11f957fceb234692ae8df47a704cd5bba7b360ef3c261c56b9a7fff4dc197aec22ff2db7d716bc0f382f8511b25be63ad27760af454c001b01780ed566a5e4521f9ef42a22069ca62028af9838b33d35d819cfea562221305ad73b108976424663fcb031853d94b78661eb9406f728308ca"], 0x129) r3 = dup3(r1, 0xffffffffffffff9c, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r4, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000340)=0xc5, &(0x7f0000000400)=0x1) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000000c0)=@generic={0x3, 0x1e, 0x9}) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:38 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) 03:33:38 executing program 5: eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) getuid() lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003dc0)=0xe8) 03:33:38 executing program 1: setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000540)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/34, &(0x7f0000000440)=0x22) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000200)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:38 executing program 2: alarm(0x0) syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="727a6d612e8af067e3c88128d0", 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f00000001c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x26b) socket$nl_generic(0x10, 0x3, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000480)) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:39 executing program 3: clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 03:33:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x101002, 0x0) write(r0, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x6}) 03:33:39 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x20000350) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000bc0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000013c0)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001400)={@dev}, 0x14) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000001000)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000780), &(0x7f0000001040)=0x40) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'L+', 0xf3}, 0x28, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000180)='.\x00', &(0x7f0000000700)) pipe2(&(0x7f0000000280), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x129) r3 = dup3(r1, 0xffffffffffffff9c, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r4, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000340)=0xc5, &(0x7f0000000400)=0x1) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000000c0)=@generic={0x3, 0x1e, 0x9}) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:39 executing program 0: clock_gettime(0x4000000000004, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000780), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000440)=0xe8) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000980)=0x6e) 03:33:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) 03:33:39 executing program 1: setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000540)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/34, &(0x7f0000000440)=0x22) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000200)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") [ 332.882202] netlink: 'syz-executor5': attribute type 16 has an invalid length. [ 332.917930] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 332.946757] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:40 executing program 5: syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000007c0)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000780)) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000c00)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0xfe, &(0x7f0000000600)=""/254}, 0x48) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='\x00', 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), 0x4) io_setup(0x0, &(0x7f0000000500)) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580), &(0x7f0000000700)='\\GPLvboxnet0\'nodev&\x00', 0xfffffffffffffff8) io_submit(0x0, 0x0, &(0x7f0000001940)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d00)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000025c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002ac0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:40 executing program 3: inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001300)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000018c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ac0)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001bc0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e00)) getuid() stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f0000001f00)) pipe(&(0x7f0000005400)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000005580)=0xe8) lstat(&(0x7f00000055c0)='./file0\x00', &(0x7f0000005600)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005980), &(0x7f00000059c0)=0xc) getresgid(&(0x7f0000005a00), &(0x7f0000005a40), &(0x7f0000005a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005b40)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000005c40)=0xe8) getegid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c80), &(0x7f0000005cc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000071c0)) getresuid(&(0x7f0000007200), &(0x7f0000007240), &(0x7f0000007280)) getgroups(0x1e439b86eb889b64, &(0x7f0000005d80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007640)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007780)) getpid() getresuid(&(0x7f00000001c0), &(0x7f0000007840), &(0x7f0000007880)) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x129) r3 = dup3(r1, 0xffffffffffffff9c, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r4, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000340)=0xc5, &(0x7f0000000400)=0x1) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000000c0)=@generic={0x3, 0x1e, 0x9}) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:40 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) lseek(r0, 0x0, 0x0) 03:33:40 executing program 2: keyctl$setperm(0x12, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in6=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8) getresgid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001680)=0xe8) getgroups(0x0, &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002ac0)) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002bc0), &(0x7f0000002c00)=0xc) gettid() getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003400)) geteuid() lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) gettid() getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) gettid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getresgid(&(0x7f0000003bc0), &(0x7f0000003c00), &(0x7f0000003c40)) openat$userio(0xffffffffffffff9c, &(0x7f0000003c80)='/dev/userio\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000062c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006300)={{{@in6, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000006400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006440), &(0x7f0000006480)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000064c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000006600)=0xe8) getresgid(&(0x7f0000006680), &(0x7f00000066c0), &(0x7f0000006700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006740)) getuid() fstat(0xffffffffffffffff, &(0x7f0000006780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006c00), 0x0, 0x0) 03:33:40 executing program 3: prctl$setmm(0x8, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:40 executing program 0: perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000040)={'ip6_vti0\x00', @ifru_data=&(0x7f00000000c0)="a32fd3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 03:33:40 executing program 0: getpid() getpid() creat(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000003c0)=0xffffffe7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getresuid(&(0x7f0000003280), &(0x7f0000000780), &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) getuid() stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000003b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getgid() getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002780)) fstat(0xffffffffffffffff, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000028c0)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000003bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000029c0), &(0x7f0000002a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002b40)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000002c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f00000033c0)) geteuid() stat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) 03:33:40 executing program 1: setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000540)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000480)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/34, &(0x7f0000000440)=0x22) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000200)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x129) r3 = dup3(r1, 0xffffffffffffff9c, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r4, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000340)=0xc5, &(0x7f0000000400)=0x1) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000000c0)=@generic={0x3, 0x1e, 0x9}) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:41 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) gettid() shutdown(0xffffffffffffffff, 0x1) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) 03:33:41 executing program 2: timerfd_create(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000900)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000a40)={'broute\x00', 0x0, 0x0, 0xbd, [], 0x0, &(0x7f0000000940), &(0x7f0000000980)=""/189}, &(0x7f0000000ac0)=0x78) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() io_setup(0x0, &(0x7f0000000400)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000b00)) io_cancel(0x0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)}, &(0x7f0000000800)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000bc0)=""/79) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) 03:33:41 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[], 0x23f) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$int_in(r0, 0x800000c0045003, &(0x7f00000004c0)=0x100000035) 03:33:41 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:41 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)) 03:33:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="58465342000010000000000000000040c0000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 03:33:41 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='/dev/full\x00') ustat(0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f00)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)}) memfd_create(&(0x7f0000001500)='vmnet0md5sum-proc@selfmime_type)vmnet1/\x00', 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000001540)=""/27) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) pipe2(&(0x7f0000000340), 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) [ 334.822041] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 334.853067] XFS (loop1): RT mount failed 03:33:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="58465342000010000000000000000040c0000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 03:33:42 executing program 3: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:42 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) gettid() shutdown(0xffffffffffffffff, 0x1) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) [ 335.240789] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 335.275700] XFS (loop1): RT mount failed 03:33:42 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) sysfs$1(0x1, &(0x7f0000000180)='/dev/null\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='lo#ppp1#user\x00', 0xffffffffffffff9c}, 0x10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000200), 0x4) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) 03:33:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="58465342000010000000000000000040c0000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 03:33:42 executing program 4: timer_create(0x0, &(0x7f0000000040)={0x0, 0x3, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) getpgrp(0xffffffffffffffff) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000280)) getpgid(0x0) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) munlockall() ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000700)=""/4096) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:42 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0xfffffffffffffc66, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x5) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r1, r0, &(0x7f0000000240), 0x40800fff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0xa}], 0x271) [ 335.657659] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 335.672388] XFS (loop1): RT mount failed 03:33:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="58465342000010000000000000000040c0000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 03:33:42 executing program 0: prctl$setname(0x1b, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) shmctl$IPC_RMID(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 3: getrusage(0x1, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f00000001c0), 0x8) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) unshare(0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000003c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000002c0)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5dd24ce60971fb3e3636f7c02c33ffff") 03:33:43 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) gettid() shutdown(0xffffffffffffffff, 0x1) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) [ 336.042473] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 336.076767] XFS (loop1): RT mount failed 03:33:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) close(r0) 03:33:43 executing program 2: sysinfo(&(0x7f0000000380)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f38285230f083170079fbc463fd7998b400ba0000ffff7545dcfb010d64acf65c31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0x127) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getpgid(0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) gettid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001700)) getpid() 03:33:43 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getresuid(&(0x7f0000002c80), &(0x7f0000000200), &(0x7f0000000080)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:43 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x100000001, 0x0, 0xef26}) 03:33:43 executing program 3: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ff2000/0x3000)=nil, 0x3000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) getuid() geteuid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) getresgid(&(0x7f0000000880), &(0x7f0000000b80), &(0x7f0000000bc0)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000ec0)=ANY=[], 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') syslog(0x0, &(0x7f0000000e00)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:44 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) gettid() shutdown(0xffffffffffffffff, 0x1) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) 03:33:44 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) 03:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:44 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x1f) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe8030000, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r2, 0x80000) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x8, 0x3, [0xf4, 0x9, 0x3e]}, &(0x7f00000003c0)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) 03:33:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x14) listen(r0, 0x800000002) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 03:33:45 executing program 5: syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x440000) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in=@rand_addr, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000400)=""/10, 0xa}, 0x120) 03:33:45 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000200), 0x4) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 338.286084] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.344307] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.376080] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:33:45 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x1f) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe8030000, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r2, 0x80000) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x8, 0x3, [0xf4, 0x9, 0x3e]}, &(0x7f00000003c0)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) [ 338.407922] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.428828] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.493493] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.516412] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.530532] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.537469] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.544856] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 338.562936] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 03:33:45 executing program 0: keyctl$invalidate(0x11, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000340), &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0), &(0x7f0000000400)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}}, 0xa0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 03:33:45 executing program 3: semget$private(0xffffff7f, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)="81", 0x0) syz_open_dev$sndseq(&(0x7f0000f36000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "42fe0f10d5e2d365", "441b3862aa98d34bdd2c624dfeafedf7eef75146a5c373bd269372bc7fe0dbf4"}) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340), &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, "7175657565310000000000000000000000000000000000000000000000000000000013000000000000000000000000000000000000000f00"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:33:46 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x1f) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe8030000, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r2, 0x80000) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x8, 0x3, [0xf4, 0x9, 0x3e]}, &(0x7f00000003c0)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) 03:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:46 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000003900)='/dev/vhost-net\x00', 0x2, 0x0) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) getgroups(0x0, &(0x7f0000004080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000049c0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004ac0)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) fstat(0xffffffffffffffff, &(0x7f0000004b40)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004e80)) fstat(0xffffffffffffffff, &(0x7f0000004ec0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f40), &(0x7f0000004f80)=0xc) getgroups(0x0, &(0x7f0000004fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005000)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000005100)='./file0\x00', &(0x7f0000005140)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000051c0)={{{@in6=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000052c0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005340)={{{@in6=@ipv4, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000005440)=0xe8) getresgid(&(0x7f0000005480), &(0x7f00000054c0), &(0x7f0000005500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005540), &(0x7f0000005580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000055c0)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005a00)) geteuid() getgroups(0x0, &(0x7f0000005a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005ac0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000005bc0)=0xe8) getresgid(&(0x7f0000005c00), &(0x7f0000005c40), &(0x7f0000005c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005cc0)) fstat(0xffffffffffffffff, &(0x7f0000005d00)) getresgid(&(0x7f0000005d80), &(0x7f0000005dc0), &(0x7f0000005e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005e40), &(0x7f0000005e80)=0xc) stat(&(0x7f0000005ec0)='./file0\x00', &(0x7f0000005f00)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f00000072c0), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:46 executing program 3: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)) 03:33:46 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x1f) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe8030000, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r2, 0x80000) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x8, 0x3, [0xf4, 0x9, 0x3e]}, &(0x7f00000003c0)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) 03:33:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)="1bef697c728000580000", 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) 03:33:47 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x228402, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x0, @empty, 0x0, 0x0, 'lblcr\x00'}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e5f6175d1a01c4c129758298c87b6a31a3b786e2989fc421fae62dff7ad536") 03:33:47 executing program 5: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000004580)=[{{&(0x7f0000004300)=@sco, 0x80, &(0x7f0000004500), 0x0, &(0x7f0000004540)=""/28, 0x1c}}], 0x1, 0x0, &(0x7f0000004680)={0x0, 0x989680}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup3(r2, r0, 0x0) 03:33:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x857}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x7c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:33:48 executing program 3: keyctl$set_reqkey_keyring(0x2, 0xf) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000000), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) 03:33:48 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000b80)) 03:33:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:48 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) dup(0xffffffffffffffff) 03:33:48 executing program 5: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) getgroups(0x0, &(0x7f0000003400)) getpid() getuid() getegid() ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) lstat(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)) getegid() 03:33:48 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:48 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:49 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:49 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:49 executing program 3: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000c80)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b00)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000b40)) add_key(&(0x7f0000000600)='rxrpc_s\x00', &(0x7f0000000640), &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0x0) 03:33:49 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:49 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x442000) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x0, 0x800) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c003f23"], 0x5) close(r0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) execveat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=[&(0x7f00000004c0)='veth0_to_bridge\x00'], &(0x7f0000000780)=[&(0x7f0000000600)='eth0selinux\x00', &(0x7f0000000640)='^aem0$!ppp0#bdev\x00', &(0x7f0000000680)='cpuset&*\x00', &(0x7f00000006c0)='system[-}\\{\x00', &(0x7f0000000700)='/dev/input/mice\x00'], 0x1400) 03:33:49 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:50 executing program 5: times(&(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) sysinfo(&(0x7f0000000140)=""/245) syz_open_pts(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f00000000c0), &(0x7f00000002c0), &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000480)=0xc) stat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:50 executing program 1: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000640), 0x1) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="42805da06e0f460f46dc0f01ee263a2086008484c0c176cb66662626660f69b200000000290070e13a8ca50c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e268ff043108900000000000f2e628af5c4c4a1ff701c3f04670f6f33adbe90dfe2987e") socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000780)=0xc) getpid() geteuid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000009c0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000031c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200), &(0x7f0000003240)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000003380)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000033c0)) getuid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003400)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003540)=0xe8) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003580)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000003680)=0xe8) getpgid(0xffffffffffffffff) getuid() gettid() stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b80)={{{@in6=@loopback, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003c80)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003cc0)) lstat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003dc0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003ec0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f00), &(0x7f0000003f40)=0xc) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007d80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000007ec0)=0xe8) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007f00)={{{@in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000008000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008040), &(0x7f0000008080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000080c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @dev}}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000081c0)=0xe8) pipe2$9p(&(0x7f0000008200), 0x0) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008780), &(0x7f00000087c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008800)={{{@in6=@local, @in6=@mcast1}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000008900)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008980)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000008a80)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008ac0)) getresuid(&(0x7f0000008b00), &(0x7f0000008b40), &(0x7f0000008b80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008bc0)) geteuid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c140)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f000000c240)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000c780), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x910}, 0xc, &(0x7f0000000a80)={&(0x7f00000000c0)=@ipv6_newroute={0x1c}, 0x1c}}, 0x0) 03:33:50 executing program 3: mkdir(&(0x7f0000003f00)='./file0/file0\x00', 0x0) getegid() mount(&(0x7f0000002080)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) inotify_init() clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x80045430, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) stat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f00000004c0)) fchownat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000003e00)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6}, &(0x7f00000001c0)=0x100) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000400), 0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200), 0x8) pivot_root(&(0x7f0000003e40)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 03:33:50 executing program 2: shmget$private(0x7000005, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) tkill(0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000003c0)={{0x2, 0x0, @local}, {}, 0x0, {0x2, 0x0, @dev}, 'veth0_to_bond\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)={'bridge0\x00'}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000002c0)=""/207) memfd_create(&(0x7f00000005c0)="00de5f730fc4dde358fe3ba4bfb715dcbc11abbdd9d0a585271d124ecba17c44bee0c32c90936bb4c0b66d4bf09b109c89a86b3737d7370dd7d80c45630f5753c48d2aa62e19972594f058", 0x0) rt_sigpending(&(0x7f0000000280), 0x8) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast1, @in=@remote}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@remote}}, 0xe8) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000a00)=""/229) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000480), &(0x7f00000004c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, &(0x7f0000000640)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000680), 0x8) timer_gettime(0x0, &(0x7f0000000540)) socket$vsock_stream(0x28, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) 03:33:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000013000/0x2000)=nil, 0x2000}, 0x1}) 03:33:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x6, &(0x7f0000000000)=@srh, 0x8) 03:33:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="f201426882df24561d21bdcac42e964d4a3bdbb3e51f02ad87bbfca254dd50f58f74f1442f7d0078d3cfac7d54fe7f8d61f40caa7228a0d145a46f00b58368acf4875c612fa32b86790583aab2cf740ee37b133385771482bf648315dab2a1e016a8688010e8ad6b2e53e6656b876b9edd829a5f6b8406ac54a5d8d30a355eaef2a97ed8b8535891b27fa3689fb474505b222725b24d0db213b3aaffb6b5c6deccac44cae0a391782762fe156ef1377878c0c182c2f4c1ed8bb7fa3aecc8929c1d9cad43b0bdd12b2f21048352adb08a27977377fbbb9cc72e115a777401c19b164f4d5a77323b5385dc84039d75a2dac42d0526b140a0fa876c29b137c16c9c") syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0xa02102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)}, &(0x7f0000000180)) 03:33:50 executing program 4: lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\x00'}, &(0x7f00000000c0)='\x00', 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080), 0xff32) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000040)=""/4, &(0x7f0000000000)=0x4) 03:33:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="f201426882df24561d21bdcac42e964d4a3bdbb3e51f02ad87bbfca254dd50f58f74f1442f7d0078d3cfac7d54fe7f8d61f40caa7228a0d145a46f00b58368acf4875c612fa32b86790583aab2cf740ee37b133385771482bf648315dab2a1e016a8688010e8ad6b2e53e6656b876b9edd829a5f6b8406ac54a5d8d30a355eaef2a97ed8b8535891b27fa3689fb474505b222725b24d0db213b3aaffb6b5c6deccac44cae0a391782762fe156ef1377878c0c182c2f4c1ed8bb7fa3aecc8929c1d9cad43b0bdd12b2f21048352adb08a27977377fbbb9cc72e115a777401c19b164f4d5a77323b5385dc84039d75a2dac42d0526b140a0fa876c29b137c16c9c") syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:50 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000002c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74562ea4a4991ac463416b4c33005631a3b786e2989f7f") 03:33:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="0000000000000080eb4142e1b2a20962446db1566dd695ea63970131417c4180fc0a3017cf0081a83f46e4ae83c245ec41b7658054990ea91d3e269df60e8b297394c990cdd539f04c86aa085c816fa7f4c7acc1c6226625260e5753d3c8a4d5d30e1c63730399854b03250e0c58582035ede1592017734cde8207bb15582e5bd5aa676964f698bb0e7768a3ef0ff17fd64ef61f45de2ab31674f6f118023079aa75ef579ab56b4b000917dca887e3dfb747af84e02a20225178296f07a0d4cd4b1f1720c5cb924aa0eb64950cdb0d2a7b80621cdc32e89b9e46b1f26463935b47a4f8e32e52521c05264d6102f8402f63b74324362e6efb15fd6ace84d834", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="f201426882df24561d21bdcac42e964d4a3bdbb3e51f02ad87bbfca254dd50f58f74f1442f7d0078d3cfac7d54fe7f8d61f40caa7228a0d145a46f00b58368acf4875c612fa32b86790583aab2cf740ee37b133385771482bf648315dab2a1e016a8688010e8ad6b2e53e6656b876b9edd829a5f6b8406ac54a5d8d30a355eaef2a97ed8b8535891b27fa3689fb474505b222725b24d0db213b3aaffb6b5c6deccac44cae0a391782762fe156ef1377878c0c182c2f4c1ed8bb7fa3aecc8929c1d9cad43b0bdd12b2f21048352adb08a27977377fbbb9cc72e115a777401c19b164f4d5a77323b5385dc84039d75a2dac42d0526b140a0fa876c29b137c16c9c") syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:51 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000f3f00000000120f0a00110001001f750800390099ed4f05000000000000000000", 0x27) 03:33:51 executing program 1: pipe2$9p(&(0x7f0000000200), 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:51 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:51 executing program 3: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="0000000000000080eb4142e1b2a20962446db1566dd695ea63970131417c4180fc0a3017cf0081a83f46e4ae83c245ec41b7658054990ea91d3e269df60e8b297394c990cdd539f04c86aa085c816fa7f4c7acc1c6226625260e5753d3c8a4d5d30e1c63730399854b03250e0c58582035ede1592017734cde8207bb15582e5bd5aa676964f698bb0e7768a3ef0ff17fd64ef61f45de2ab31674f6f118023079aa75ef579ab56b4b000917dca887e3dfb747af84e02a20225178296f07a0d4cd4b1f1720c5cb924aa0eb64950cdb0d2a7b80621cdc32e89b9e46b1f26463935b47a4f8e32e52521c05264d6102f8402f63b74324362e6efb15fd6ace84d834", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="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") syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) dup3(r1, r0, 0x0) 03:33:51 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000f3f00000000120f0a00110001001f750800390099ed4f05000000000000000000", 0x27) 03:33:51 executing program 3: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000010f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000010fc0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000011000)={{{@in, @in=@dev}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000011100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000011140)={0x0, @broadcast, @multicast1}, &(0x7f0000011180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000111c0)={0x0, @broadcast, @local}, &(0x7f0000011200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:51 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000f3f00000000120f0a00110001001f750800390099ed4f05000000000000000000", 0x27) 03:33:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffffffc, 0x20000000000003}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000300)="7b9806577425147e1f639df91e4f9be0acc155f282811c", 0x17) 03:33:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@bridge_newneigh={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) 03:33:52 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000f3f00000000120f0a00110001001f750800390099ed4f05000000000000000000", 0x27) 03:33:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@bridge_newneigh={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) 03:33:52 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:33:52 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000140)) ioprio_get$uid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000002c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() sysfs$3(0x3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@bridge_newneigh={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) 03:33:52 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@local, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) geteuid() lstat(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)) fstat(0xffffffffffffff9c, &(0x7f0000000700)) getgroups(0x0, &(0x7f0000000780)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000d80), 0x24, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ec0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) 03:33:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@bridge_newneigh={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) 03:33:52 executing program 4: prctl$setname(0x15, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) 03:33:52 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) socket$inet(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getpid() setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:52 executing program 0: inotify_init() fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000000c0)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9e6e60feefa6b2179a6e5e5c4017d10100f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f2e7f") lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='security.SMACK64EXEC\x00', &(0x7f0000000200)=""/17, 0x11) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000380)) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) 03:33:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002000)=""/4096) 03:33:53 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:53 executing program 1: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@ipv4={[], [], @local}}, &(0x7f0000000880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @rand_addr, @multicast1}, &(0x7f0000000340)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@remote, @multicast2}, &(0x7f00000010c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast2}, &(0x7f0000001200)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002440)=""/232, 0xe8}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xfffffe15) accept$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002700)=0xfffffffffffffd02) getpeername$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xffffffffffffff18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003080)={@broadcast, @local}, &(0x7f00000030c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@mcast2}, &(0x7f0000003140)=0xfffffffffffffcfc) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004080)={'team0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:53 executing program 5: keyctl$set_reqkey_keyring(0x15, 0x1fffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000002c0)) unshare(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000003200)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000001080)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000010c0)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) getuid() stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da053cbcbef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac5f6070364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 03:33:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2285, 0x0) 03:33:53 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2081f5) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) sendto$unix(r2, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl(r0, 0x1, &(0x7f00000011c0)) 03:33:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x88) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18}, 0x18) 03:33:53 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="01000000000000007f") setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) sched_yield() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 03:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="83", 0x1}], 0x1) [ 346.824452] autofs4:pid:9826:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 346.856400] autofs4:pid:9830:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 03:33:53 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) 03:33:54 executing program 0: pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) socket$inet6(0xa, 0x3, 0x2f) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffe8b) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)) 03:33:54 executing program 3: getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) epoll_create1(0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/5, 0x5) getrlimit(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:33:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a5cc80700315f85715070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$binfmt_aout(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="9c"], 0x1) fcntl$setstatus(r2, 0x4, 0x6100) write$P9_RLOPEN(r2, &(0x7f0000000240)={0x18}, 0x18) ftruncate(r1, 0x208200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) futex(&(0x7f0000000ffc), 0x0, 0x0, &(0x7f0000003ff0)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x0) symlinkat(&(0x7f0000008ff8)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 347.345222] syz-executor4 (9832) used greatest stack depth: 12688 bytes left [ 347.702448] syz-executor2 (9854) used greatest stack depth: 11640 bytes left 03:33:55 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffe4a, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) 03:33:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 03:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:55 executing program 0: msgget(0x1, 0x0) pipe2(&(0x7f0000000040), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000580)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/7) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000005c0), &(0x7f0000000600)=0x4) syz_execute_func(&(0x7f0000000080)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") request_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0), &(0x7f0000000200)='&securityppp0em1oppp1vmnet1mime_typekeyringposix_acl_access&\x00', 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005d40)={&(0x7f00000002c0), 0xc, &(0x7f0000005c80)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000340)) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$session_to_parent(0x12) io_setup(0x0, &(0x7f0000000500)) keyctl$join(0x1, &(0x7f0000000280)) io_destroy(0x0) semget(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000005e00)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000005d80)}, 0x78) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/148) keyctl$link(0x8, 0x0, 0x0) 03:33:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r1, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x1000000000013) listen(r2, 0x5) 03:33:55 executing program 5: eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) getuid() lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003dc0)=0xe8) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) getpgid(0x0) 03:33:55 executing program 3: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"2238c7b1031c357b056f97503ba9d1664a607702bd4813574b1c40848977f0c727bd968ac51228ca1672e6346d4966ca6654e75a4d028df04ab9dde20237a7c9dc80b45f3c3c9c338f5a54de947bbebb782863fd88f5251807adceab74047b4c0773c3ba3b031c9332a3aa2ff3187a598cc051218273a796723914065f27e762fa1bef47ca0e00b6520af666f727de4567ab75465b4a9c0ba2f89a2fad94836611b89245331034f83ee66bf15401ad269eedb88695efe58dc0accc1a419d8c4b3b5a0657e5de5dc06555ae7377c596540f62bb9f3f33d06a6cf0bbd391fdeea9636c45dea620e05d3e42f17810c5ea6c69140e4f9d75476579c31d0963140d8313cf1b6676426842bf8a0a30acf3247dbdf47dd1fd30694eac7a4fce15453f013c5f146c772fb53bef1761f637f7dc16367397f00751b9aa0c159a971add020528329a2ddfa4335f135b570589146b17616b0be7a11cf408b567cbfef13578f2ba23be06ce973c2338271a5a01e2a872089e293c1b380b99aef8cac7ca3704c8a1aad4d37e356e0c2b600dc223b5d5be267c25db18eaf70d20a0a829d61052b47dc7726df8c83e61bd34ae86f7cfc2564805b519def9ec1ac4c1d2336ffd0031591490773bd81d17952aae349e80331bb54b2669fe682fbd1a6a6250284cb1c8e4d53cbd3733a436b0461d052061c785af6842521fb16a410a22f983d113b4565ee2707fbaf3ec3c63399b4a0b716edd53cca9cbf899fa492454ab98649cf055d91701c69872b09ce6141969f68d66b38dc0b5b5b0772e24cbd296cbc947a08f5d170f8fdcd0b0e74ff6c1622fd0d41112ff93e27cdad6dc20dd4a88d46a098e50281d0e04d797f9774db707a7c39bc25331257c4ee2ee884078aca4d2f1aad0309f29ee4f4303210c952c371131026b1d890521d50b26b9c5094210facb7fb13fdbdb6217b41d8768747e3ca594cccbdde0c5fa621ee1460f8cdf228a721bcaca0bbff01cfb8c1ebd6ff1c54bea578cf2aa3513eae36e8f50a9300d5b85e22d36a592f078ff1f81c811d05978079119745a1b9707d43e462f4a75ca99a3c7d93d42ad766354aaa92776134d857e3953431769066fa080ade83054dce797bca9385a238faa5559609fd2c8225efbf000b895b640fa69dd1c8da2e7aa66e537c91fd39f5bd691d56d67bc4ba690b4b309a36b67ac05243529ab6dff25763c54e7e12e650925e41d96662a0ef67cf8e7c783cefa1a3f6d254374c61bcc4ce6c5d822689d9dab031ddea0a16fe39caf08e043c890304008ee1037a72c471514372b9eb7b6e4c6096a39151d0ecb2466e3e01d4ac37d7e0bbcd3ef347370721d8786ee9ce793919f41196e2ae7e10433e52469f448da2928943b178736bbfd50b3f937c67eb34858f099ef5e6c54c3314409a95c80abdb700d3f22713ba76acabc0e"}) 03:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:56 executing program 3: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"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"}) 03:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:56 executing program 1: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"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"}) 03:33:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x13, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 03:33:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) 03:33:56 executing program 5: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @local, @local}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@broadcast, @broadcast}, 0xc) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240), 0x8) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@delqdisc={0x24}, 0x24}}, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000001c0)='erspan0\x00') clock_gettime(0x0, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = userfaultfd(0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x40) 03:33:56 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffc) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$addseals(r0, 0x409, 0xc) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000680)="b169d69b28aaba54b1e4e2f1e604e3c7c2177ab4ecf94813199947e19b12950f9dbd9a05d6fe9a9ed6ab9a701a5660c9f2a5408ebdfd0ee08e4247b82a4997959ac488891c0cf9", 0x47}], 0x1, 0x0, 0x0, 0x40000}, 0x4008080) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x12000000) 03:33:56 executing program 3: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"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"}) 03:33:56 executing program 1: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"2238c7b1031c357b056f97503ba9d1664a607702bd4813574b1c40848977f0c727bd968ac51228ca1672e6346d4966ca6654e75a4d028df04ab9dde20237a7c9dc80b45f3c3c9c338f5a54de947bbebb782863fd88f5251807adceab74047b4c0773c3ba3b031c9332a3aa2ff3187a598cc051218273a796723914065f27e762fa1bef47ca0e00b6520af666f727de4567ab75465b4a9c0ba2f89a2fad94836611b89245331034f83ee66bf15401ad269eedb88695efe58dc0accc1a419d8c4b3b5a0657e5de5dc06555ae7377c596540f62bb9f3f33d06a6cf0bbd391fdeea9636c45dea620e05d3e42f17810c5ea6c69140e4f9d75476579c31d0963140d8313cf1b6676426842bf8a0a30acf3247dbdf47dd1fd30694eac7a4fce15453f013c5f146c772fb53bef1761f637f7dc16367397f00751b9aa0c159a971add020528329a2ddfa4335f135b570589146b17616b0be7a11cf408b567cbfef13578f2ba23be06ce973c2338271a5a01e2a872089e293c1b380b99aef8cac7ca3704c8a1aad4d37e356e0c2b600dc223b5d5be267c25db18eaf70d20a0a829d61052b47dc7726df8c83e61bd34ae86f7cfc2564805b519def9ec1ac4c1d2336ffd0031591490773bd81d17952aae349e80331bb54b2669fe682fbd1a6a6250284cb1c8e4d53cbd3733a436b0461d052061c785af6842521fb16a410a22f983d113b4565ee2707fbaf3ec3c63399b4a0b716edd53cca9cbf899fa492454ab98649cf055d91701c69872b09ce6141969f68d66b38dc0b5b5b0772e24cbd296cbc947a08f5d170f8fdcd0b0e74ff6c1622fd0d41112ff93e27cdad6dc20dd4a88d46a098e50281d0e04d797f9774db707a7c39bc25331257c4ee2ee884078aca4d2f1aad0309f29ee4f4303210c952c371131026b1d890521d50b26b9c5094210facb7fb13fdbdb6217b41d8768747e3ca594cccbdde0c5fa621ee1460f8cdf228a721bcaca0bbff01cfb8c1ebd6ff1c54bea578cf2aa3513eae36e8f50a9300d5b85e22d36a592f078ff1f81c811d05978079119745a1b9707d43e462f4a75ca99a3c7d93d42ad766354aaa92776134d857e3953431769066fa080ade83054dce797bca9385a238faa5559609fd2c8225efbf000b895b640fa69dd1c8da2e7aa66e537c91fd39f5bd691d56d67bc4ba690b4b309a36b67ac05243529ab6dff25763c54e7e12e650925e41d96662a0ef67cf8e7c783cefa1a3f6d254374c61bcc4ce6c5d822689d9dab031ddea0a16fe39caf08e043c890304008ee1037a72c471514372b9eb7b6e4c6096a39151d0ecb2466e3e01d4ac37d7e0bbcd3ef347370721d8786ee9ce793919f41196e2ae7e10433e52469f448da2928943b178736bbfd50b3f937c67eb34858f099ef5e6c54c3314409a95c80abdb700d3f22713ba76acabc0e"}) 03:33:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x835, 0x0, 0x0, {}, [@IFA_ADDRESS={0xf}, @IFA_LOCAL={0x14}]}, 0x40}}, 0x0) 03:33:57 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getpid() getgid() lstat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000840)) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f0000000380)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000400)=0x80, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f0000001e00)={0x0, 0x989680}, &(0x7f0000000500), 0x0) getpid() dup(0xffffffffffffffff) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000000980)=@ll, &(0x7f0000000800)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@empty, @loopback}, &(0x7f00000011c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001200)={{{@in=@loopback, @in=@remote}}, {{}, 0x0, @in=@dev}}, &(0x7f0000001300)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001340)=@hci, &(0x7f00000013c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001400)={@empty, @loopback}, &(0x7f0000001440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c40)={0x0, @local, @remote}, &(0x7f0000001c80)=0xc) accept(0xffffffffffffffff, &(0x7f0000001cc0)=@xdp, &(0x7f0000001d40)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001dc0)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f0000000640), 0xc, &(0x7f0000003500)={&(0x7f0000002ec0)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001e40)=""/97) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r0, &(0x7f0000000380)=""/4096, 0x145f) 03:33:57 executing program 5: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) times(&(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'vcan0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000440), 0xc, &(0x7f0000000680)={&(0x7f0000000f40)=ANY=[]}}, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) 03:33:57 executing program 2: prctl$setname(0x15, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004d80)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004dc0)={'vcan0\x00'}) socket$inet_sctp(0x2, 0x0, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000004e00), &(0x7f0000004e40)=0x14) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_getoverrun(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@local, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000005040)=0xe8) syz_execute_func(&(0x7f00000002c0)="42805da06af4d8f746dc0f01ee263a208600d7c0c176c4822d0c0b66662626660f69b2000000002900c4e19856560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04bdbe90dfe2987e") 03:33:57 executing program 1: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"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"}) 03:33:57 executing program 3: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r3 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000780)={"2238c7b1031c357b056f97503ba9d1664a607702bd4813574b1c40848977f0c727bd968ac51228ca1672e6346d4966ca6654e75a4d028df04ab9dde20237a7c9dc80b45f3c3c9c338f5a54de947bbebb782863fd88f5251807adceab74047b4c0773c3ba3b031c9332a3aa2ff3187a598cc051218273a796723914065f27e762fa1bef47ca0e00b6520af666f727de4567ab75465b4a9c0ba2f89a2fad94836611b89245331034f83ee66bf15401ad269eedb88695efe58dc0accc1a419d8c4b3b5a0657e5de5dc06555ae7377c596540f62bb9f3f33d06a6cf0bbd391fdeea9636c45dea620e05d3e42f17810c5ea6c69140e4f9d75476579c31d0963140d8313cf1b6676426842bf8a0a30acf3247dbdf47dd1fd30694eac7a4fce15453f013c5f146c772fb53bef1761f637f7dc16367397f00751b9aa0c159a971add020528329a2ddfa4335f135b570589146b17616b0be7a11cf408b567cbfef13578f2ba23be06ce973c2338271a5a01e2a872089e293c1b380b99aef8cac7ca3704c8a1aad4d37e356e0c2b600dc223b5d5be267c25db18eaf70d20a0a829d61052b47dc7726df8c83e61bd34ae86f7cfc2564805b519def9ec1ac4c1d2336ffd0031591490773bd81d17952aae349e80331bb54b2669fe682fbd1a6a6250284cb1c8e4d53cbd3733a436b0461d052061c785af6842521fb16a410a22f983d113b4565ee2707fbaf3ec3c63399b4a0b716edd53cca9cbf899fa492454ab98649cf055d91701c69872b09ce6141969f68d66b38dc0b5b5b0772e24cbd296cbc947a08f5d170f8fdcd0b0e74ff6c1622fd0d41112ff93e27cdad6dc20dd4a88d46a098e50281d0e04d797f9774db707a7c39bc25331257c4ee2ee884078aca4d2f1aad0309f29ee4f4303210c952c371131026b1d890521d50b26b9c5094210facb7fb13fdbdb6217b41d8768747e3ca594cccbdde0c5fa621ee1460f8cdf228a721bcaca0bbff01cfb8c1ebd6ff1c54bea578cf2aa3513eae36e8f50a9300d5b85e22d36a592f078ff1f81c811d05978079119745a1b9707d43e462f4a75ca99a3c7d93d42ad766354aaa92776134d857e3953431769066fa080ade83054dce797bca9385a238faa5559609fd2c8225efbf000b895b640fa69dd1c8da2e7aa66e537c91fd39f5bd691d56d67bc4ba690b4b309a36b67ac05243529ab6dff25763c54e7e12e650925e41d96662a0ef67cf8e7c783cefa1a3f6d254374c61bcc4ce6c5d822689d9dab031ddea0a16fe39caf08e043c890304008ee1037a72c471514372b9eb7b6e4c6096a39151d0ecb2466e3e01d4ac37d7e0bbcd3ef347370721d8786ee9ce793919f41196e2ae7e10433e52469f448da2928943b178736bbfd50b3f937c67eb34858f099ef5e6c54c3314409a95c80abdb700d3f22713ba76acabc0e"}) 03:33:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$addseals(r0, 0x409, 0xc) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000680)="b169d69b28aaba54b1e4e2f1e604e3c7c2177ab4ecf94813199947e19b12950f9dbd9a05d6fe9a9ed6ab9a701a5660c9f2a5408ebdfd0ee08e4247b82a4997959ac488891c0cf9", 0x47}], 0x1, 0x0, 0x0, 0x40000}, 0x4008080) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x12000000) 03:33:58 executing program 4: setxattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@random={'system.', 'syz0\x00'}, &(0x7f0000000280)='user\x00', 0x5, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000a80)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=""/86, &(0x7f0000000440)=0x56) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) 03:33:58 executing program 3: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00004a5000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1, 0x17}]}, &(0x7f0000f91ffc)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x2, 0x9fffffff, 0xb, 0x7a, 0x0, 0xffffff50}]}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f0000d35000)=""/4096}, 0x48) 03:33:58 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000000c0)='v\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x26118}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:33:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001a000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000240)="df1f3e650f01c80f51152eef26a850a50f090f20e06635000040000f22e00f71d227267300", 0x25}], 0x1, 0x72, &(0x7f0000000380), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x70003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:58 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000059c0)={&(0x7f0000000cc0), 0xc, &(0x7f00000058c0), 0x0, &(0x7f0000005940)}, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") 03:33:58 executing program 2: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f000000a380)=""/96) sendmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 351.665287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$addseals(r0, 0x409, 0xc) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000680)="b169d69b28aaba54b1e4e2f1e604e3c7c2177ab4ecf94813199947e19b12950f9dbd9a05d6fe9a9ed6ab9a701a5660c9f2a5408ebdfd0ee08e4247b82a4997959ac488891c0cf9", 0x47}], 0x1, 0x0, 0x0, 0x40000}, 0x4008080) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x12000000) [ 351.858170] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001a000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000240)="df1f3e650f01c80f51152eef26a850a50f090f20e06635000040000f22e00f71d227267300", 0x25}], 0x1, 0x72, &(0x7f0000000380), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x70003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:59 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000000c0)='v\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x26118}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:33:59 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 352.238457] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0), 0x4) 03:33:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001a000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000240)="df1f3e650f01c80f51152eef26a850a50f090f20e06635000040000f22e00f71d227267300", 0x25}], 0x1, 0x72, &(0x7f0000000380), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x70003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:59 executing program 2: mount$9p_xen(&(0x7f0000000480)='bond0\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)={'trans=xen,'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) 03:33:59 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000000c0)='v\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x26118}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:33:59 executing program 1: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001a000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000240)="df1f3e650f01c80f51152eef26a850a50f090f20e06635000040000f22e00f71d227267300", 0x25}], 0x1, 0x72, &(0x7f0000000380), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x70003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:00 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$addseals(r0, 0x409, 0xc) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000680)="b169d69b28aaba54b1e4e2f1e604e3c7c2177ab4ecf94813199947e19b12950f9dbd9a05d6fe9a9ed6ab9a701a5660c9f2a5408ebdfd0ee08e4247b82a4997959ac488891c0cf9", 0x47}], 0x1, 0x0, 0x0, 0x40000}, 0x4008080) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x12000000) [ 353.016671] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:00 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:00 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000000c0)='v\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x26118}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 353.598113] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:00 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:00 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:00 executing program 1: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:01 executing program 5: clock_gettime(0x7, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000008c0)=0xaa) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001000)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001140)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000001240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006fc0), 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000045c0)={&(0x7f0000000400), 0xc, &(0x7f0000004580)={&(0x7f0000004280)={0x14}, 0x14}}, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) socket$inet(0x10, 0x0, 0x0) 03:34:01 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000a80)={0x13, 0x10, 0x7, {&(0x7f0000000880), r1, 0x1000000000000300}}, 0x18) 03:34:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) 03:34:01 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:01 executing program 0: clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$seccomp(0x26, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{}]}) 03:34:01 executing program 0: clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$seccomp(0x26, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{}]}) 03:34:02 executing program 0: clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$seccomp(0x26, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{}]}) 03:34:02 executing program 1: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:02 executing program 0: clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$seccomp(0x26, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{}]}) 03:34:02 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:02 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:02 executing program 5: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000c80)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:02 executing program 0: getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000007c0), &(0x7f0000000800)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 03:34:02 executing program 0: getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000007c0), &(0x7f0000000800)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 03:34:02 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5ea2", 0x5a) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:34:02 executing program 0: getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000007c0), &(0x7f0000000800)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001500)=ANY=[@ANYBLOB="ac1414bb00000000000000ffffffffff627071300000000000000000000000007663616e300000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000620003400000000000000000000000000000b801f0010000000000000000000000000000000000000000000000002001636f6d6d656e7400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 03:34:02 executing program 1: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:03 executing program 0: getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000007c0), &(0x7f0000000800)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001500)=ANY=[@ANYBLOB="ac1414bb00000000000000ffffffffff627071300000000000000000000000007663616e300000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000620003400000000000000000000000000000b801f0010000000000000000000000000000000000000000000000002001636f6d6d656e7400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 03:34:03 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101080, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bpq0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x0, "20a8208840a63e43"}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x0, @multicast1}}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 5: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000c80)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='net/ip6_flowlabel\x00') openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=0x6e) set_robust_list(&(0x7f0000000200)={&(0x7f00000001c0)={&(0x7f0000000040)}}, 0x18) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") pipe(&(0x7f0000000400)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480), 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000440)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=""/252, &(0x7f00000003c0)=0xfc) 03:34:03 executing program 2: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000040)) close(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) 03:34:03 executing program 1: clock_gettime(0x5, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x3b, 0x0, @remote, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 03:34:04 executing program 4: clock_gettime(0x9, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:04 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f00000003c0)="04c14e166692f0f8b17500955310060e92aec87568838306f9b1d5a4c28f202a7612b4a3061af475004929e1895a9a0b1d2e15f8e5d7f28c74bb39b9e767bf4a09906b31a08a3fecbc53aa2c0ce4b4573fcd2c46d5e31958259b193b4463bbf0ac4877c3450b1e7c07f2c11ba250779a95dcad49ca162269dfbf6fe2058e54f6dc3b23b3b0d6c9a5531316bc3ccea03528c2ed008927d02ff1176c4f14d61a4ee375d4c0882a26efd8510e98ff9c68d42071f7bee1b2c1fb5dcc14050000000ec24e7d702d235f86f69ea937939dbcd80d61d851934cce045e06330af73d", 0xde) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x8000}}, 0x30) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000100)={{0x0, 0x2710}}, &(0x7f0000000000)) 03:34:04 executing program 5: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000c80)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x9, 0x4, 0x4, 0x1, 0xc, 0x1}, 0x2c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 03:34:04 executing program 3: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0xffffffffffffff5f) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) shmget(0xffffffffffffffff, 0xf000, 0x0, &(0x7f0000ff1000/0xf000)=nil) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @dev}, &(0x7f00000005c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@mcast2}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xfffffeed) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140), 0x7c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000640)) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d80)=0x14) seccomp(0x0, 0x0, &(0x7f0000000300)) 03:34:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x9, 0x4, 0x4, 0x1, 0xc, 0x1}, 0x2c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 03:34:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x9, 0x4, 0x4, 0x1, 0xc, 0x1}, 0x2c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 03:34:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x9, 0x4, 0x4, 0x1, 0xc, 0x1}, 0x2c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) 03:34:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001040000040d000a00ea1100000005000000", 0x29}], 0x1) 03:34:04 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x7, 0x0, {{0x10, "5b73656c669e757365722d73656c662d"}}}, 0x1d) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff8000/0x1000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 357.681098] netlink: 'syz-executor2': attribute type 10 has an invalid length. [ 357.731491] netlink: 'syz-executor2': attribute type 10 has an invalid length. 03:34:04 executing program 1: keyctl$join(0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000c40)=ANY=[], 0x0) removexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000180)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) removexattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@random={'btrfs.', '\x00'}) getgid() chroot(&(0x7f00000002c0)='./file0\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c8400f1837370f38211a99c19086d9f28fd94164eefaef4e0163dbdbe54175455d0f2e1a911a01660ff7f031a3b786e298bf7f") 03:34:04 executing program 2: r0 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x6) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) fallocate(r0, 0x3, 0x7, 0x200000800eb97) 03:34:05 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:34:05 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=0x1, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @empty, 0x1}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000480)={r1, 0x200, 0x1}, 0xffffff65) keyctl$join(0x1, &(0x7f0000000c40)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e24, @remote}}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x7d7, 0x86a, 0x0, 0x0, 0x5, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x7}}, &(0x7f0000000100)=0xb0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(r3, &(0x7f00000005c0)="8d78fae5a63426491f", 0x9, 0xfffffffffffffff8, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bbr\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000600), 0x13f}}, 0x20) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000e00)=ANY=[@ANYBLOB="05a182000000000001000040070000000b9e9c1b030000000200000005000000000000000000000000000000000000000d000000030000008f49018a010000000700000016e10302bdaeb576839ff520b420040000000800000000000000000000000025a32b73449c80800a000003000300000007000000000000000000000000000007ff823dc9240a6d0001000000040000000500000007000000ff000000ff0100000000000000000000000000000e0000403600000001000000e5000000d1270000ffffff7f03000000b12f00000000000000000000000000000000"]) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000006c0)=""/219, &(0x7f0000000240)=0xdb) lseek(0xffffffffffffffff, 0x42, 0x7) syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000c00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000bc0), 0x111, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000580)) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x436cb35e5d000000]}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f0000000b40)='./file0\x00', 0x0, 0x18}, 0x10) 03:34:05 executing program 5: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000c80)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000000c0)=""/21) 03:34:05 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, 0x14) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x210200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0xd6c1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, r3) tkill(r3, 0x401104000000016) 03:34:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001fb, 0x10400003) 03:34:05 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=0x1, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @empty, 0x1}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000480)={r1, 0x200, 0x1}, 0xffffff65) keyctl$join(0x1, &(0x7f0000000c40)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e24, @remote}}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x7d7, 0x86a, 0x0, 0x0, 0x5, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x7}}, &(0x7f0000000100)=0xb0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(r3, &(0x7f00000005c0)="8d78fae5a63426491f", 0x9, 0xfffffffffffffff8, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bbr\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000600), 0x13f}}, 0x20) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000e00)=ANY=[@ANYBLOB="05a182000000000001000040070000000b9e9c1b030000000200000005000000000000000000000000000000000000000d000000030000008f49018a010000000700000016e10302bdaeb576839ff520b420040000000800000000000000000000000025a32b73449c80800a000003000300000007000000000000000000000000000007ff823dc9240a6d0001000000040000000500000007000000ff000000ff0100000000000000000000000000000e0000403600000001000000e5000000d1270000ffffff7f03000000b12f00000000000000000000000000000000"]) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000006c0)=""/219, &(0x7f0000000240)=0xdb) lseek(0xffffffffffffffff, 0x42, 0x7) syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000c00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000bc0), 0x111, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000580)) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x436cb35e5d000000]}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f0000000b40)='./file0\x00', 0x0, 0x18}, 0x10) [ 358.672691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:06 executing program 1: prctl$setmm(0x1c, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) accept$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000003c0)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000840)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000880)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000008c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000b80)) socket$pptp(0x18, 0x1, 0x2) perf_event_open$cgroup(&(0x7f0000000c00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000bc0)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$usbmon(&(0x7f0000000c80)='/dev/usbmon#\x00', 0x0, 0x0) accept4$llc(0xffffffffffffff9c, &(0x7f0000000cc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000d00)=0x10, 0x0) timerfd_create(0x0, 0x0) creat(&(0x7f0000000d40)='./file0\x00', 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000d80)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) getgid() openat$audio(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/audio\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/snapshot\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000f80)) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000010c0)=0xe8) getgroups(0x0, &(0x7f0000001100)) perf_event_open(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000b00), 0x0, &(0x7f0000001440)}, 0x0) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:06 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:34:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001fb, 0x10400003) 03:34:06 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:34:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001fb, 0x10400003) 03:34:06 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=0x1, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @empty, 0x1}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000480)={r1, 0x200, 0x1}, 0xffffff65) keyctl$join(0x1, &(0x7f0000000c40)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e24, @remote}}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x7d7, 0x86a, 0x0, 0x0, 0x5, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x7}}, &(0x7f0000000100)=0xb0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(r3, &(0x7f00000005c0)="8d78fae5a63426491f", 0x9, 0xfffffffffffffff8, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bbr\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000600), 0x13f}}, 0x20) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000e00)=ANY=[@ANYBLOB="05a182000000000001000040070000000b9e9c1b030000000200000005000000000000000000000000000000000000000d000000030000008f49018a010000000700000016e10302bdaeb576839ff520b420040000000800000000000000000000000025a32b73449c80800a000003000300000007000000000000000000000000000007ff823dc9240a6d0001000000040000000500000007000000ff000000ff0100000000000000000000000000000e0000403600000001000000e5000000d1270000ffffff7f03000000b12f00000000000000000000000000000000"]) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000006c0)=""/219, &(0x7f0000000240)=0xdb) lseek(0xffffffffffffffff, 0x42, 0x7) syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000c00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000bc0), 0x111, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000580)) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x436cb35e5d000000]}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f0000000b40)='./file0\x00', 0x0, 0x18}, 0x10) 03:34:06 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, 0x14) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x210200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0xd6c1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, r3) tkill(r3, 0x401104000000016) 03:34:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001fb, 0x10400003) [ 359.596711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:06 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=0x1, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @empty, 0x1}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000480)={r1, 0x200, 0x1}, 0xffffff65) keyctl$join(0x1, &(0x7f0000000c40)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e24, @remote}}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x7d7, 0x86a, 0x0, 0x0, 0x5, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x7}}, &(0x7f0000000100)=0xb0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(r3, &(0x7f00000005c0)="8d78fae5a63426491f", 0x9, 0xfffffffffffffff8, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='bbr\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000600), 0x13f}}, 0x20) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000e00)=ANY=[@ANYBLOB="05a182000000000001000040070000000b9e9c1b030000000200000005000000000000000000000000000000000000000d000000030000008f49018a010000000700000016e10302bdaeb576839ff520b420040000000800000000000000000000000025a32b73449c80800a000003000300000007000000000000000000000000000007ff823dc9240a6d0001000000040000000500000007000000ff000000ff0100000000000000000000000000000e0000403600000001000000e5000000d1270000ffffff7f03000000b12f00000000000000000000000000000000"]) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000006c0)=""/219, &(0x7f0000000240)=0xdb) lseek(0xffffffffffffffff, 0x42, 0x7) syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000c00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000bc0), 0x111, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000580)) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x436cb35e5d000000]}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f0000000b40)='./file0\x00', 0x0, 0x18}, 0x10) 03:34:07 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt(r2, 0x11, 0x66, &(0x7f0000000080)=""/139, &(0x7f0000000000)=0x8b) 03:34:07 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:34:07 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:34:07 executing program 1: clock_gettime(0x2, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @loopback}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'veth1_to_bond\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:07 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, 0x14) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x210200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0xd6c1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, r3) tkill(r3, 0x401104000000016) 03:34:07 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt(r2, 0x11, 0x66, &(0x7f0000000080)=""/139, &(0x7f0000000000)=0x8b) [ 360.399645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt(r2, 0x11, 0x66, &(0x7f0000000080)=""/139, &(0x7f0000000000)=0x8b) 03:33:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv4_newrule={0x38, 0x20, 0x21, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@FRA_FLOW={0x8}, @FRA_SRC={0x8}, @FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8}]}, 0xff90}}, 0x0) 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt(r2, 0x11, 0x66, &(0x7f0000000080)=""/139, &(0x7f0000000000)=0x8b) 03:33:20 executing program 2: clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) 03:33:20 executing program 0: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) getpgid(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:33:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:33:20 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, 0x14) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x210200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0xd6c1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, r3) tkill(r3, 0x401104000000016) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x401000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000300)=0xffffffffffffffbe) r3 = syz_open_procfs(r2, &(0x7f0000000100)='personality\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "a53f2fa2f3323aa054ada099b5bca57377ae9ed56389608cfc3d52d2f16b46aa1e9200906eba664dee3633d3771482ee9fc770e3a3a0201286d5ffba8868e1704e178e2a3054d8748cab200bd0de2029c137ef97cb6f7b564b2d5d93e2eea44eda720651"}, 0x68) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) [ 361.294800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x204, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0xc, 0x0, 0x0, 0x0, [{[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 03:33:20 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) waitid(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000480)='net/anycast6\x00') perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='keyring^ppp0@wlan0\'\x00') socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() mkdir(&(0x7f0000000500)='./file0\x00', 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@local}}, &(0x7f0000000cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001000)={'team_slave_0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001080)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000004a40), 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000004bc0)=@can, &(0x7f0000004c40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004c80)={{{@in=@loopback, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000004d80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004ec0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x284) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005000)={'sit0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006540)={@dev}, &(0x7f0000006580)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006b40)={&(0x7f0000000800), 0xc, &(0x7f0000006b00)={&(0x7f00000065c0)={0x14}, 0x14}}, 0x0) getpgid(0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/83, 0x53, 0x0, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @loopback}, 0xc) 03:33:20 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, &(0x7f0000000980)) unlink(&(0x7f0000000540)='./file0/file0\x00') 03:33:20 executing program 0: getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)) mount$9p_xen(&(0x7f0000000040)="262ea5707070303a5e292900", &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000480)={'trans=xen,'}) keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readv(0xffffffffffffffff, &(0x7f00000005c0), 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:20 executing program 2: memfd_create(&(0x7f0000000080)='@eth1cpuset\x00', 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000100)=""/205) pipe2$9p(&(0x7f0000001b40), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000001f80)=0xe8) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002080)={{{@in=@loopback, @in6=@mcast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000002180)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000021c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002200)={{{@in6=@mcast1, @in=@local}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002300)=0xe8) stat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000002400)=0xe8) getresgid(&(0x7f00000035c0), &(0x7f0000003600), &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f00000036c0)) getgroups(0x0, &(0x7f0000003740)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000003a40)) getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:33:21 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect(r0, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80) 03:33:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './file1'}}, {@metacopy_off='metacopy=off'}, {@index_on='index=on'}]}) 03:33:21 executing program 5: getitimer(0x0, &(0x7f0000000180)) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1, 0xa}, 0x10) 03:33:21 executing program 4: socket$inet(0x2, 0x20000010000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 362.313398] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 362.343740] overlayfs: missing 'lowerdir' [ 362.425206] [ 362.452469] ********************************************************** [ 362.478530] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 362.505997] ** ** [ 362.530308] ** trace_printk() being used. Allocating extra memory. ** [ 362.544147] ** ** [ 362.570218] ** This means that this is a DEBUG kernel and it is ** [ 362.598813] ** unsafe for production use. ** [ 362.638186] ** ** [ 362.657372] ** If you see this message and you are not debugging ** 03:33:21 executing program 1: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 362.683478] ** the kernel, report this immediately to your vendor! ** [ 362.740239] ** ** [ 362.746935] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 362.789325] ********************************************************** 03:33:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000300)={0xffffffffffffffff, r0}) 03:33:21 executing program 0: clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) io_setup(0x0, &(0x7f0000000480)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000300)={0xffffffffffffffff, r0}) 03:33:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000300)={0xffffffffffffffff, r0}) 03:33:21 executing program 5: ustat(0xb, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)}, &(0x7f0000000380)=0x10) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:22 executing program 2: eventfd2(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001580)) msgget$private(0x0, 0x0) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='lo\x00') getgid() getuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getpgid(0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001500)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001280)=""/131, 0x83) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000001340), &(0x7f0000001380)) msgget(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000013c0)) sched_getscheduler(0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) msgrcv(0x0, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\x00', 0xffffffffffffff9c}, 0x10) 03:33:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000300)={0xffffffffffffffff, r0}) 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x3, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000000207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 03:33:22 executing program 3: prctl$setname(0x34, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) [ 363.438768] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:22 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) sched_getparam(0x0, &(0x7f0000000140)) socket$inet(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x282, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) sched_getscheduler(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) inotify_init1(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000600)=""/66, 0x42) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="68756765746c622e324d422e75736167655f696e5f62797465730037199767f95cdc654061907e38e4c6900d10a67ac6d51ae409a2c9f828ef860f6dfedee32c60c9ecbcad972a41d78d935473000800000000", 0x0, 0x0) 03:33:22 executing program 1: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:22 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000480)) syz_open_procfs(0x0, &(0x7f0000000380)='net/llc\x00') unshare(0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000500)={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={"fc657468305f746f5f62726964676500"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) sched_getparam(0x0, &(0x7f00000006c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[]}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000240)={0x30}, 0x30) [ 363.872344] audit: type=1326 audit(2000000002.640:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10470 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:22 executing program 0: getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000240), &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:22 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) shmget(0x3, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in=@remote}}, 0xe8) open$dir(&(0x7f0000000200)='./file1\x00', 0x4002, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) 03:33:23 executing program 3: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getgid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getpgrp(0x0) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) getgroups(0x0, &(0x7f0000001180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001940)) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001b00)=0xffffffffffffffff, 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in6=@loopback, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) gettid() getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) fstat(0xffffffffffffffff, &(0x7f0000001e40)) 03:33:23 executing program 1: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) shmget(0x3, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in=@remote}}, 0xe8) open$dir(&(0x7f0000000200)='./file1\x00', 0x4002, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) 03:33:23 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) [ 364.714508] audit: type=1326 audit(2000000003.480:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10470 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:23 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:23 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:23 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:23 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:23 executing program 0: clock_gettime(0x4, &(0x7f0000001140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "70144461f373c9de3fbcd2d8511517a6132c49ca52f5766e7188046d66a23a1d0cf71efb7e26bfcb42a21c09940ebf684568b0857fcd4563d6e7638c2b1f27e4", "b65a6d478bb1ac13a889648b91c5db11c6a16ce22d17d490029b1a2d64c9ab70b8845545a793e430b78a4287134aa04247f14f762bdef9b0942cb31c39369e2f", "4a7f3afd9effde715ba1939252b2bf66679f9f76c9a6f93ab63f13f668799df8"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b40)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) shmget(0x3, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in=@remote}}, 0xe8) open$dir(&(0x7f0000000200)='./file1\x00', 0x4002, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) 03:33:24 executing program 5: setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:24 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x3000)=nil}) dup2(0xffffffffffffffff, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x200840, 0x0) 03:33:24 executing program 3: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0af0fef69dce9d92a5c41ff0f1837f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") 03:33:24 executing program 1: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:24 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:24 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) shmget(0x3, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in=@remote}}, 0xe8) open$dir(&(0x7f0000000200)='./file1\x00', 0x4002, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) 03:33:24 executing program 4: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001000)={0x0, @multicast2, @broadcast}, &(0x7f0000001040)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @loopback, @rand_addr}, &(0x7f0000001100)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in6=@local, @in=@local}}, {{@in6=@local}}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003d80)={@empty, @dev}, &(0x7f0000003dc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003ec0)={{}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000003fc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004000)={@ipv4={[], [], @loopback}}, &(0x7f0000004040)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000050c0)={@local}, &(0x7f0000005100)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000005140)={@mcast2}, &(0x7f0000005180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000051c0), &(0x7f0000005200)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005540)={@empty, @multicast1}, &(0x7f0000005580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000055c0)={0x0, @empty, @multicast1}, &(0x7f0000005600)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005640)={@rand_addr, @multicast2}, &(0x7f0000005680)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000057c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005800)={@remote, @local}, &(0x7f0000005840)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000005880)={@dev, @remote}, &(0x7f00000058c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000005900)={'nr0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005ac0)={{{@in=@rand_addr, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005bc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005f80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005fc0)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000940), 0xc, &(0x7f0000006a40)={&(0x7f0000006000)={0x14}, 0x14}}, 0x0) getuid() fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240), 0xc, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[]}}, 0x0) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_open_pts(0xffffffffffffffff, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) 03:33:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 03:33:24 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) socketpair$inet(0x2, 0x2, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xffffffffffffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000003c0)={0x0, 0x1, 0x6}, 0x10) getgroups(0x0, &(0x7f0000000380)) keyctl$chown(0x4, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) [ 366.220951] Unknown ioctl 1074835115 [ 366.256512] Unknown ioctl 1074835115 03:33:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 03:33:25 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) [ 366.421606] Unknown ioctl 1074835115 03:33:25 executing program 3: prctl$intptr(0x22, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') [ 366.513886] Unknown ioctl 1074835115 03:33:25 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}}, 0x0) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 03:33:25 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) [ 366.641993] Unknown ioctl 1074835115 [ 366.685456] Unknown ioctl 1074835115 03:33:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) 03:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2, &(0x7f0000000100)=@raw=[@initr0], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000440)=""/195}, 0x1e) 03:33:25 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x3, 0xa7c}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x5084f74d, {0x2, 0x0, @rand_addr=0xfd02}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x8000a0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x8000000b, 0x2}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x9, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x1, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000380)=0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget(0x3, 0x2000, 0x54000100, &(0x7f0000ffb000/0x2000)=nil) lseek(r0, 0x0, 0x3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) [ 366.806161] Unknown ioctl 1074835115 03:33:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000058c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f0000007b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203737c3397c2ac4611311dd8f4978c73264a7400f01ef417545d8ec2e1a6901460f01ee30215da57e35988613980f1a09") openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b40)) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40), &(0x7f0000001c80)=0xc) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) getresgid(&(0x7f0000000280), &(0x7f0000000240), &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgroups(0x0, &(0x7f0000002080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000020c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002200)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) fstat(0xffffffffffffffff, &(0x7f0000002280)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002580)) fstat(0xffffffffffffffff, &(0x7f00000025c0)) getresgid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getpgrp(0xffffffffffffffff) getresuid(&(0x7f00000040c0), &(0x7f0000004100), &(0x7f0000004140)) fstat(0xffffffffffffffff, &(0x7f0000004180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004540)=0xe8) getresgid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) getpid() getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) fstat(0xffffffffffffffff, &(0x7f0000005840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c00)) getuid() [ 366.893215] Unknown ioctl 1074835115 03:33:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000080)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)) personality(0x0) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000340)) futex(&(0x7f0000000c40), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000c00), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getuid() ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b80)={&(0x7f0000000980)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127a, 0x70d000) 03:33:25 executing program 1: keyctl$invalidate(0x13, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380), &(0x7f00000003c0)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/188) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000400)=""/77) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 03:33:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x0, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x14f) writev(r1, &(0x7f0000001400)=[{&(0x7f0000001380)="b9", 0x1}], 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 03:33:26 executing program 3: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x5) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @dev}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xfffffeed) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000d00)={'vcan0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000640)) getpeername$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000b00)) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000480), 0x10) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") fanotify_init(0x0, 0x0) getpriority(0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000a80)=ANY=[], &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x4) 03:33:26 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f00000001c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}}) 03:33:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x20900) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 03:33:26 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r0, 0x802c550a, &(0x7f0000000080)={0x2, 0x0, [{0xa1, 0x70d000, 0x8}]}) [ 367.590876] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 367.616154] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:26 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000300)=0x8000000000003, 0x8) 03:33:26 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f00000001c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}}) 03:33:26 executing program 2: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001540)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000015c0)) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 03:33:26 executing program 4: select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000001c0)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000740)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000880)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001000)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000001100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f00000012c0)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@remote, @in=@local}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) openat$dsp(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dsp\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) getuid() getresgid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:26 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:26 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f00000001c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}}) 03:33:26 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:26 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f00000001c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}}) 03:33:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x2, 0x0, 0x100000001, 0x1}) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 03:33:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, @in6}, 0x90) 03:33:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @rand_addr}}}}, &(0x7f0000000140)=0xb0) 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) getpeername$packet(r2, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14) 03:33:27 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044145, &(0x7f0000001f64)) 03:33:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488dd25d766070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) 03:33:27 executing program 2: creat(&(0x7f0000000840)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000400)=@security={'security\x00', 0xe, 0x4, 0x360, 0x120, 0x218, 0x0, 0x218, 0x218, 0x310, 0x310, 0x310, 0x310, 0x310, 0x4, &(0x7f0000000240), {[{{@uncond, 0x0, 0x98, 0xd8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'bond_slave_1\x00', 'ip_vti0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000008c0)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x90) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:33:28 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200008000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='*yz.\x00', 0x1ff) 03:33:28 executing program 1: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000340), &(0x7f0000000580)=0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000002200)={0x13, 0x4, 0xfa00, {&(0x7f0000004800)}}, 0x159) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000005c0), &(0x7f0000000600)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000640), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@remote, @in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000b00)=0xe8) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) gettid() getuid() getgroups(0x0, &(0x7f0000002300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002380)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000025c0)={{{@in6, @in=@multicast1}}}, &(0x7f00000026c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002700), &(0x7f0000002740)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002a00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000002b40)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b80)) getuid() getgid() syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:28 executing program 3: umount2(&(0x7f00000000c0)='./file0\x00', 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value, &(0x7f0000000380)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x9}, 0x28, 0x0) 03:33:28 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x31, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) 03:33:28 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x5, 0x4, 0x4, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) 03:33:28 executing program 2: clock_gettime(0x4, &(0x7f0000000300)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000180), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) pipe(&(0x7f0000000080)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000480)="e762f05c6b6579726901000100958b4e90f2892c0523c92727d74e3d6e6700", &(0x7f00000000c0), &(0x7f0000000440)='\x00', 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) 03:33:28 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x5, 0x4, 0x4, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) 03:33:28 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x5, 0x4, 0x4, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 03:33:29 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, {@in=@rand_addr}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 03:33:29 executing program 5: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getgid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getpgrp(0x0) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000000340)) getgroups(0x0, &(0x7f0000001180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001940)) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001b00)=0xffffffffffffffff, 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in6=@loopback, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) gettid() getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) fstat(0xffffffffffffffff, &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f0000000080)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002500)={{{@in=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000002600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002640), &(0x7f0000002680)=0xc) geteuid() lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003dc0)={{{@in=@dev, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003ec0)=0xe8) getegid() gettid() stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004040)) stat(&(0x7f0000004080)='./file0\x00', &(0x7f00000040c0)) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000004300)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) 03:33:29 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x5, 0x4, 0x4, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 03:33:29 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:29 executing program 3: clock_gettime(0x8, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000680), &(0x7f0000000700)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x18b) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000000380)=0xffffffffffffff6b) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000004540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x3, 0x1000000000ff) sendto$unix(r1, &(0x7f0000000100)="cbb09ec9ee0ecf2a696fe878c580b7058d9fb02cbe81eb8fb14c58aa17b871e38c114dfec3dd9d44", 0x28, 0x4000800, &(0x7f0000000180)=@abs, 0x6e) 03:33:29 executing program 1: futex(&(0x7f0000000440), 0x8, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:29 executing program 4: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) memfd_create(&(0x7f0000000380)='ah\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00)={@remote}, &(0x7f0000000a40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'tunl0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b00)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003c00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000003c40)={@broadcast, @local}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000005040), &(0x7f0000005080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000050c0)={@dev, @broadcast}, &(0x7f0000005100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005140)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000005240)=0xe8) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000052c0)=@req={0x28, &(0x7f0000005280)={'lo\x00', @ifru_addrs=@xdp}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005340)={{{@in6, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000005440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000059c0), &(0x7f0000005a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005a40)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005ac0)={@local, @loopback}, &(0x7f0000005b00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005b40), &(0x7f0000005b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005f80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005fc0)={0x0, @local, @dev}, &(0x7f0000006000)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000061c0)={@multicast2, @loopback}, &(0x7f0000006200)=0xc) accept(0xffffffffffffff9c, &(0x7f0000006300)=@hci, &(0x7f0000006380)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x9a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000f940)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f000000fa40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000010300)={&(0x7f0000000600), 0xc, &(0x7f00000102c0)={&(0x7f0000000b80)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) pipe(&(0x7f0000000280)) getpeername$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @remote}, &(0x7f0000000300)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "4815bdeff0f66df0525c7b19ce3c017536ea16bd341332968e6e664cf18f62e88aad46be995a94a977a3f881149f51affb88a76efd29c29b3333db4acdd565f67aec3c3fbc804c87c0a0618b6010238a"}, 0xd8) waitid(0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000340)={'veth0_to_team\x00'}) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/7, 0x7) 03:33:29 executing program 2: time(&(0x7f00000003c0)) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000380)=""/165) clock_gettime(0x0, &(0x7f0000005980)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005700), 0x0, 0x0, &(0x7f00000059c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005a40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) getegid() getgroups(0x0, &(0x7f0000000440)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000040)={'ip6gretap0\x00', {0x2, 0x0, @remote}}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) getegid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getgroups(0x0, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000800)) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) getegid() getgroups(0x0, &(0x7f0000000880)) syz_execute_func(&(0x7f00000008c0)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:29 executing program 2: memfd_create(&(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000500)) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b40)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000b80)={0x43}, 0xfffffffffffffe65) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) 03:33:30 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bond0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x5a) 03:33:30 executing program 5: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000880)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000180)) keyctl$set_timeout(0xf, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000300)={'filter\f\x00', 0x0, 0x0, 0xa6, [], 0x0, &(0x7f0000000100), &(0x7f0000000240)=""/166}, &(0x7f0000000000)=0x78) 03:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x8, &(0x7f0000000140)=0x0) r3 = socket(0x1e, 0x1000000000005, 0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) sendmsg(r3, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000000300), 0x0, &(0x7f000016cf61)}, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x38) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x5ee}]) 03:33:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bond0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x5a) 03:33:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000), 0x36) 03:33:30 executing program 2: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:31 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) recvmsg$kcm(r1, &(0x7f00000006c0)={&(0x7f0000000200)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)=""/154, 0x9a}], 0x1, &(0x7f0000000640)=""/72, 0x48}, 0x40) 03:33:31 executing program 4: keyctl$dh_compute(0x1d, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bond0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x5a) 03:33:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80004002, 0x0) io_setup(0x20000000000004, &(0x7f0000000100)=0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x208000, 0x0) io_setup(0x1f, &(0x7f0000000280)) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x42, 0x0, 0xd, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f00000001c0)=""/175) 03:33:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000001680)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:31 executing program 5: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000880)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000180)) keyctl$set_timeout(0xf, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bond0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x5a) 03:33:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x1802}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) 03:33:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80004002, 0x0) io_setup(0x20000000000004, &(0x7f0000000100)=0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x208000, 0x0) io_setup(0x1f, &(0x7f0000000280)) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x42, 0x0, 0xd, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f00000001c0)=""/175) [ 373.196992] netlink: del zone limit has 4 unknown bytes 03:33:32 executing program 3: prctl$setname(0x3, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000200)=ANY=[]) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000280), 0x4) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000180), 0xa) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") pipe(&(0x7f0000000580)) prctl$intptr(0x0, 0x0) 03:33:32 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0x8010aa01, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}}) 03:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1000000004e23, 0x4eed, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x7fff}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000006c0)={0x100, 0x0, 0x0, 0x0, r2}, &(0x7f0000000700)=0x10) listen(r0, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x3}, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf1}, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xffffffff00000007, &(0x7f000005ffe4)={0xa, 0x4e23, 0x6000000, @loopback}, 0x1c) 03:33:32 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000000)) ptrace(0x4208, r1) 03:33:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0x9a) 03:33:32 executing program 4: shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:32 executing program 5: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000880)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000180)) keyctl$set_timeout(0xf, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:32 executing program 1: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='\\\x00'}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000240)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1000000004e23, 0x4eed, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x7fff}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000006c0)={0x100, 0x0, 0x0, 0x0, r2}, &(0x7f0000000700)=0x10) listen(r0, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x3}, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf1}, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xffffffff00000007, &(0x7f000005ffe4)={0xa, 0x4e23, 0x6000000, @loopback}, 0x1c) 03:33:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80004002, 0x0) io_setup(0x20000000000004, &(0x7f0000000100)=0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x208000, 0x0) io_setup(0x1f, &(0x7f0000000280)) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x42, 0x0, 0xd, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f00000001c0)=""/175) 03:33:33 executing program 3: timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000540)=@can, 0x80, &(0x7f0000001800), 0x0, &(0x7f0000001880)=""/138, 0x8a}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x0, 0x3, &(0x7f0000000240), &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000340)}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) 03:33:33 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/194) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000012d640500000000006504040001dc00000704000001000000b7040000000000006a0a00fe00000000850000001a000000b700ff0f000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:33:33 executing program 5: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000880)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000180)) keyctl$set_timeout(0xf, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1000000004e23, 0x4eed, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x7fff}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000006c0)={0x100, 0x0, 0x0, 0x0, r2}, &(0x7f0000000700)=0x10) listen(r0, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x3}, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf1}, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xffffffff00000007, &(0x7f000005ffe4)={0xa, 0x4e23, 0x6000000, @loopback}, 0x1c) 03:33:33 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000880), 0x8) fstat(0xffffffffffffffff, &(0x7f0000000980)) geteuid() setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000380), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000800)) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80004002, 0x0) io_setup(0x20000000000004, &(0x7f0000000100)=0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x208000, 0x0) io_setup(0x1f, &(0x7f0000000280)) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x42, 0x0, 0xd, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f00000001c0)=""/175) 03:33:34 executing program 1: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='\\\x00'}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000240)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1000000004e23, 0x4eed, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x7fff}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000006c0)={0x100, 0x0, 0x0, 0x0, r2}, &(0x7f0000000700)=0x10) listen(r0, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x3}, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf1}, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xffffffff00000007, &(0x7f000005ffe4)={0xa, 0x4e23, 0x6000000, @loopback}, 0x1c) 03:33:34 executing program 3: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 03:33:34 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @dev}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f000040e000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200006000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 03:33:35 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:35 executing program 1: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='\\\x00'}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000240)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:35 executing program 0: clock_gettime(0x3, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:35 executing program 5: futex(&(0x7f0000000040), 0xa, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:35 executing program 2: socket$unix(0x1, 0x5, 0x0) inotify_init() socket$netlink(0x10, 0x3, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/urandom\x00', 0x0, 0x0) eventfd2(0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f00000011c0)) epoll_create(0x10000) pipe2(&(0x7f000000bb00), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f000000bb40)='/dev/rtc0\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f000000bb80)='/dev/full\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f000000bbc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000000bc40)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f000000d0c0)='/dev/urandom\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f000000d100)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f000000e2c0)) socket$nl_netfilter(0x10, 0x3, 0xc) socket$unix(0x1, 0x5, 0x0) creat(&(0x7f000000e340)='./file0\x00', 0x0) epoll_create(0x2) creat(&(0x7f000000e980)='./file0\x00', 0x0) inotify_init1(0x0) pipe(&(0x7f000000ebc0)) syz_open_dev$loop(&(0x7f0000011380)='/dev/loop#\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f00000113c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000011400)) timerfd_create(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000011700)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$dir(0xffffffffffffff9c, &(0x7f0000013080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000130c0)) socket$unix(0x1, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000013180)='/dev/net/tun\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000131c0)='/dev/urandom\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) memfd_create(&(0x7f00000138c0)='(\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000013940), 0x8) timerfd_create(0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000013a00)='/dev/urandom\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) open(&(0x7f0000013a40)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 03:33:35 executing program 3: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 03:33:35 executing program 2: msgget$private(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) connect$pptp(0xffffffffffffffff, &(0x7f0000000380), 0x1e) times(&(0x7f00000001c0)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@generic) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280), &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), 0x14) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000007c0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000740)}) getpgid(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000006c0)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50}, 0x50) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:35 executing program 1: setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='\\\x00'}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000240)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) gettid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000080028000007a0a00fffffffffd630148"], &(0x7f0000000480)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) 03:33:36 executing program 0: getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'team_slave_0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000300), &(0x7f0000000380)=0xffffff20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) connect$packet(0xffffffffffffffff, &(0x7f00000004c0), 0x14) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) dup(0xffffffffffffffff) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000340), 0x4) 03:33:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:36 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900770f78993d233d23410feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") modify_ldt$read(0x0, &(0x7f0000001800)=""/58, 0xfffffffffffffd18) getegid() setfsgid(0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30}, 0xffffffffffffffa5) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000600)=ANY=[], &(0x7f0000000580)) geteuid() socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000005c0)={'lo\x00', {0x2, 0x0, @broadcast}}) semget(0xffffffffffffffff, 0x0, 0x0) getgid() getgid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000400)) request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000680)="28706f7369785f61636c5f6163636573739d6d696d655f747970652d76626f786e6574312a6d643573756d2f7b2500", 0xffffffffffffffff) keyctl$clear(0x7, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78}, 0x78) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000600)) 03:33:36 executing program 3: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 03:33:36 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)) 03:33:36 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)) 03:33:36 executing program 1: eventfd2(0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fchmod(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0), &(0x7f0000000200)="df2a4000", 0xfffffffffffffffe) clock_gettime(0x0, &(0x7f0000000400)) pselect6(0x40, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000004c0)={&(0x7f0000000480), 0x8}) request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0), &(0x7f0000000140)='\\proc\x00', 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001b40)=ANY=[], 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 03:33:37 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)) 03:33:37 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)) 03:33:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x5e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) 03:33:37 executing program 4: mkdir(&(0x7f0000003f00)='./file0/file0\x00', 0x0) getegid() mount(&(0x7f0000002080)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) inotify_init() clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x80045430, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000003e00)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001000)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001100)=0xe8) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000011c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) geteuid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000018c0)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000001d40)=0xe8) getpgrp(0xffffffffffffffff) getuid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) pivot_root(&(0x7f0000003e40)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') 03:33:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x5e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) 03:33:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x0) 03:33:37 executing program 3: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 03:33:37 executing program 5: clock_gettime(0x4000000000004, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000500), &(0x7f0000000d80)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000ec0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x90) timer_create(0x0, &(0x7f0000000d40), &(0x7f0000000d00)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000480)=0x2e) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b00), 0x0, 0x0, &(0x7f0000000c40)}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) syslog(0x0, &(0x7f00000005c0)=""/205, 0xcd) 03:33:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x5e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 03:33:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x5e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 03:33:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@remote, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000009c0)={@remote}) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a00)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000001000)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) setgroups(0x0, &(0x7f0000000f00)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f0000000a40)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 379.169946] device team0 entered promiscuous mode [ 379.188255] device team_slave_0 entered promiscuous mode [ 379.256224] device team_slave_1 entered promiscuous mode [ 379.309845] 8021q: adding VLAN 0 to HW filter on device team0 03:33:38 executing program 0: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 03:33:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) [ 379.867655] device team0 left promiscuous mode [ 379.874851] device team_slave_0 left promiscuous mode [ 379.898407] device team_slave_1 left promiscuous mode 03:33:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 1: socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000140)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000200), &(0x7f00000004c0)=0x18) syz_execute_func(&(0x7f00000005c0)="428055a0876969ef69dc00d990c8400f1837370f38211ac4410feefa4e2179fbe5e54175455d0f2e1a911a01662ff7f031a3b786e2989f7f") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000500)={0x0, 0x0, 0x0, 'queue0\x00'}) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}) [ 380.365094] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) [ 380.703791] device team0 entered promiscuous mode [ 380.708695] device team_slave_0 entered promiscuous mode [ 380.740434] device team_slave_1 entered promiscuous mode [ 380.755348] 8021q: adding VLAN 0 to HW filter on device team0 03:33:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x0) 03:33:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 0: inotify_init() openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000140)) epoll_create(0x0) open$dir(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 03:33:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d366369d8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], &(0x7f00000002c0)=0x1) r1 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x2}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002340)=""/226, 0xe2}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x5, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r7 = dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000280)={r5, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r5, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002940)={&(0x7f0000002900)="6367726f7570657468312a73797374656d046367726f7570766d6e65743000", r7}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) [ 381.252944] device team0 left promiscuous mode [ 381.258083] device team_slave_0 left promiscuous mode [ 381.264164] device team_slave_1 left promiscuous mode 03:33:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x20000000000001bd, &(0x7f0000000180)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getpgrp(0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000480)=0x4) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000340)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000400)={'icmp6\x00'}, &(0x7f0000000440)=0x1e) wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) 03:33:40 executing program 4: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) semget(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) epoll_create(0x0) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:40 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000240)="d11ee5c37519b5ed4d986b8ebcdeb630e66dcda5f62db6ada33fe144c2e6efd40e4b7a7be6b58b002b48b371a321df55c6d04fb72409686d8599b9bc92233bc081930e66932af7bb460fe50fa0a9ae2dce825f2c93ec2cf1fb7f3dacb603d8bb74cb15499dd38eeb7fcd14f0cfcbcf55cc3e1c56d0c3da3dadd99f44ae2f9fcea2c5") r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5e", 0x59) sendto$inet(r4, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r4, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:40 executing program 1: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x60000) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xa8) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0690fef69dc6a6a01eece41ff0f0f1aa141000000670fefa20c000000c19086d9f28fc9410feefa6b2179f3acc54d4113fcfbfb0fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298e47a7f") getrandom(&(0x7f0000000080)=""/16, 0xfffffffffffffe7b, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000680)=ANY=[], 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() [ 381.973853] device team0 entered promiscuous mode [ 381.979031] device team_slave_0 entered promiscuous mode [ 381.991403] device team_slave_1 entered promiscuous mode [ 382.021786] 8021q: adding VLAN 0 to HW filter on device team0 03:33:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x0) 03:33:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {@in=@rand_addr}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 03:33:41 executing program 0: get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000440)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000580)={{}, 'syz0\x00'}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000540)) fsetxattr(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], &(0x7f0000000280)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000680)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000500)) [ 382.448497] device team0 left promiscuous mode [ 382.453464] device team_slave_0 left promiscuous mode [ 382.461667] device team_slave_1 left promiscuous mode 03:33:41 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000240)="d11ee5c37519b5ed4d986b8ebcdeb630e66dcda5f62db6ada33fe144c2e6efd40e4b7a7be6b58b002b48b371a321df55c6d04fb72409686d8599b9bc92233bc081930e66932af7bb460fe50fa0a9ae2dce825f2c93ec2cf1fb7f3dacb603d8bb74cb15499dd38eeb7fcd14f0cfcbcf55cc3e1c56d0c3da3dadd99f44ae2f9fcea2c5") r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5e", 0x59) sendto$inet(r4, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r4, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:41 executing program 3: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000002c0)="941bc45a7a8b28", 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004c00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004c40)={'lo\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004c80), &(0x7f0000004cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004dc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007340)={0x0, @multicast1, @remote}, &(0x7f0000007380)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000ef80)={@local, @remote}, &(0x7f000000efc0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000f000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000f040)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000f140)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000f240)={@ipv4={[], [], @multicast2}}, &(0x7f000000f280)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000f2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000f300)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000010580), 0x0, 0x0, &(0x7f00000105c0)={0x0, 0x989680}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000010600)={{{@in=@local, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000010700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000107c0)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000108c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000010900)={{{@in=@loopback, @in6}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000010a00)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000011040)={&(0x7f0000000100), 0xc, &(0x7f0000011000)={&(0x7f0000001940)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000580)) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @local, @multicast2}, &(0x7f00000004c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000b80)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@remote, @in6}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000180), 0xc, &(0x7f00000018c0)={&(0x7f0000000bc0)=ANY=[]}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:41 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000240)="d11ee5c37519b5ed4d986b8ebcdeb630e66dcda5f62db6ada33fe144c2e6efd40e4b7a7be6b58b002b48b371a321df55c6d04fb72409686d8599b9bc92233bc081930e66932af7bb460fe50fa0a9ae2dce825f2c93ec2cf1fb7f3dacb603d8bb74cb15499dd38eeb7fcd14f0cfcbcf55cc3e1c56d0c3da3dadd99f44ae2f9fcea2c5") r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5e", 0x59) sendto$inet(r4, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r4, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:42 executing program 4: clock_gettime(0x4, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) setitimer(0x0, &(0x7f0000000300)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000340)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000940)=""/132, 0xfffffffffffffdf3, 0x0, 0x0, 0x459) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000200)=0x1c, 0x0) 03:33:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 383.192260] device team0 entered promiscuous mode [ 383.197177] device team_slave_0 entered promiscuous mode [ 383.223252] device team_slave_1 entered promiscuous mode [ 383.284104] 8021q: adding VLAN 0 to HW filter on device team0 03:33:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x0) 03:33:42 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000031c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000003580)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)) getresgid(&(0x7f0000003d00), &(0x7f0000003d40), &(0x7f0000003d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003dc0)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000003ec0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f00000052c0)='./file0\x00', &(0x7f0000005300)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRESHEX, @ANYRES16], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f0000000100)="baa1027b6d37cabddc8bcd8fa9e420e2d928dce22cfcb5c43c85f592931bafd27326a716ad9ccd90c4f1757bb9ac81532723d2aa7705c363ba53695ed1589a717f045e1c642fd85aeb01f21362b5b5fd3ff93e") chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) [ 383.802518] device team0 left promiscuous mode [ 383.807454] device team_slave_0 left promiscuous mode [ 383.814830] device team_slave_1 left promiscuous mode 03:33:42 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000240)="d11ee5c37519b5ed4d986b8ebcdeb630e66dcda5f62db6ada33fe144c2e6efd40e4b7a7be6b58b002b48b371a321df55c6d04fb72409686d8599b9bc92233bc081930e66932af7bb460fe50fa0a9ae2dce825f2c93ec2cf1fb7f3dacb603d8bb74cb15499dd38eeb7fcd14f0cfcbcf55cc3e1c56d0c3da3dadd99f44ae2f9fcea2c5") r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000400)="f6110892f57227e4f3246e09436754dfcdfc59f4af88e13a614e4aea845a3f1d06c2cf1141e5bfa6fa07a5bc1d47ea712bcd4b6ebc92ef0295586c8ae71cb96da96474613fada784e297725e751bbc9cd26ddfadf9feb49e5e", 0x59) sendto$inet(r4, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000380)=0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r4, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRESHEX, @ANYRES16], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f0000000100)="baa1027b6d37cabddc8bcd8fa9e420e2d928dce22cfcb5c43c85f592931bafd27326a716ad9ccd90c4f1757bb9ac81532723d2aa7705c363ba53695ed1589a717f045e1c642fd85aeb01f21362b5b5fd3ff93e") chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:33:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRESHEX, @ANYRES16], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f0000000100)="baa1027b6d37cabddc8bcd8fa9e420e2d928dce22cfcb5c43c85f592931bafd27326a716ad9ccd90c4f1757bb9ac81532723d2aa7705c363ba53695ed1589a717f045e1c642fd85aeb01f21362b5b5fd3ff93e") chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:33:43 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="6d617000007e36f508d267ab0c7afe9f024e551d65d1e42d5eeba686dfc9fc8c5d0183420b678fa50400"}, 0x10) [ 384.453116] device team0 entered promiscuous mode [ 384.458194] device team_slave_0 entered promiscuous mode [ 384.480349] device team_slave_1 entered promiscuous mode [ 384.487355] 8021q: adding VLAN 0 to HW filter on device team0 03:33:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRESHEX, @ANYRES16], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f0000000100)="baa1027b6d37cabddc8bcd8fa9e420e2d928dce22cfcb5c43c85f592931bafd27326a716ad9ccd90c4f1757bb9ac81532723d2aa7705c363ba53695ed1589a717f045e1c642fd85aeb01f21362b5b5fd3ff93e") chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 03:33:43 executing program 3: clock_gettime(0xfffffffffffffffb, &(0x7f0000000700)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0, &(0x7f0000002340)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @remote, @multicast1}, &(0x7f0000003600)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @dev}}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003800)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)={@dev, @multicast1}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'bridge_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003e40)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000003e80)={'sit0\x00', @ifru_addrs=@hci}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000040c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004100)={@multicast2, @multicast1}, &(0x7f0000004140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004200)={0x0, @multicast2}, &(0x7f0000004240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004600)={@loopback}, &(0x7f0000004640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004680)={{{@in=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004780)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{&(0x7f0000002340)=@pppoe={0x18, 0x0, {0x0, @local, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002940)=[{0x10, 0x111}], 0x10}}], 0x1, 0x800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c00"], 0x3) close(r2) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4000}, {r2}], 0x2, 0xe3d) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = eventfd(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r4, 0x4) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r3}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)={'#! ', './file0', [{}, {}], 0xa, "78e176a079c3fe432e2b436ea5dd6a56d16157ae0f6a273081af92a848b96dbb2ace16e4"}, 0x31) 03:33:43 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="6d617000007e36f508d267ab0c7afe9f024e551d65d1e42d5eeba686dfc9fc8c5d0183420b678fa50400"}, 0x10) 03:33:43 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() 03:33:43 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@llc, &(0x7f0000000280)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c40)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in, @in6=@mcast2}}, {{@in6=@local}}}, &(0x7f00000011c0)=0xe8) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000012c0)) geteuid() getgid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getgroups(0x0, &(0x7f0000001800)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001840)) fstat(0xffffffffffffffff, &(0x7f0000001880)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in=@loopback, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001ec0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002000)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in=@multicast1}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002740)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:43 executing program 1: getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=@gettaction={0x20, 0x32, 0x301, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 03:33:20 executing program 1: prctl$setname(0x21, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:20 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="6d617000007e36f508d267ab0c7afe9f024e551d65d1e42d5eeba686dfc9fc8c5d0183420b678fa50400"}, 0x10) [ 384.843201] tc_dump_action: action bad kind [ 384.856255] tc_dump_action: action bad kind 03:33:20 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="6d617000007e36f508d267ab0c7afe9f024e551d65d1e42d5eeba686dfc9fc8c5d0183420b678fa50400"}, 0x10) 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{&(0x7f0000002340)=@pppoe={0x18, 0x0, {0x0, @local, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002940)=[{0x10, 0x111}], 0x10}}], 0x1, 0x800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c00"], 0x3) close(r2) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4000}, {r2}], 0x2, 0xe3d) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = eventfd(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r4, 0x4) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r3}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)={'#! ', './file0', [{}, {}], 0xa, "78e176a079c3fe432e2b436ea5dd6a56d16157ae0f6a273081af92a848b96dbb2ace16e4"}, 0x31) 03:33:20 executing program 4: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getuid() getgroups(0x0, &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000d40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{&(0x7f0000002340)=@pppoe={0x18, 0x0, {0x0, @local, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002940)=[{0x10, 0x111}], 0x10}}], 0x1, 0x800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c00"], 0x3) close(r2) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4000}, {r2}], 0x2, 0xe3d) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = eventfd(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r4, 0x4) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r3}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)={'#! ', './file0', [{}, {}], 0xa, "78e176a079c3fe432e2b436ea5dd6a56d16157ae0f6a273081af92a848b96dbb2ace16e4"}, 0x31) 03:33:20 executing program 3: getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0x16b) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='bdev#vboxnet1!mime_type\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f0000001800)) getgroups(0x0, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000019c0)=0xe8) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000003380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getresuid(&(0x7f0000003440), &(0x7f0000003480), &(0x7f00000034c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getresgid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{&(0x7f0000002340)=@pppoe={0x18, 0x0, {0x0, @local, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002940)=[{0x10, 0x111}], 0x10}}], 0x1, 0x800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="013c00"], 0x3) close(r2) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4000}, {r2}], 0x2, 0xe3d) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = eventfd(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r4, 0x4) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000015c0)={r3}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)={'#! ', './file0', [{}, {}], 0xa, "78e176a079c3fe432e2b436ea5dd6a56d16157ae0f6a273081af92a848b96dbb2ace16e4"}, 0x31) 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_SET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 03:33:20 executing program 5: gettid() syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@ipv4={[], [], @multicast2}}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'veth0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@broadcast, @remote}, &(0x7f0000000a40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000bc0)={@rand_addr, @remote}, &(0x7f0000000c00)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000021c0)={{{@in=@local, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000022c0)=0xe8) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001840)={{{@in=@remote, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getgroups(0x0, &(0x7f0000000580)) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000032c0), &(0x7f0000003300)=0xc) 03:33:20 executing program 1: clock_settime(0xffffffffffffffff, 0xfffffffffffffffd) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 0: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) syz_extract_tcp_res(&(0x7f0000000880), 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) truncate(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0xfe, &(0x7f0000000600)=""/254}, 0x48) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)="6bf37972696e6700", &(0x7f00000000c0), &(0x7f00000001c0)='rxrpc\x00', 0xffffffffffffffff) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000008c0)=0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000900)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000980)={@loopback, @multicast1}, &(0x7f00000009c0)=0xc) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:20 executing program 2: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4, r1, 0x400002, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) mount(&(0x7f00000006c0), &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)="5dbc3d948123a089da95b5f5ccd24b4d3b2fb93375c404b7bc49c52a3b8d0784fa0068f384988ee0b486bf39a711768d5528b2113624770ec5ac0c971610d22d4d0b", 0x42) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(0xffffffffffffffff) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000140)="04010000008b00ddb8460900ffb25b4802938207d9033780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x800200000800, 0x5, @remote}, 0x1c) 03:33:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4, r1, 0x400002, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) mount(&(0x7f00000006c0), &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)="5dbc3d948123a089da95b5f5ccd24b4d3b2fb93375c404b7bc49c52a3b8d0784fa0068f384988ee0b486bf39a711768d5528b2113624770ec5ac0c971610d22d4d0b", 0x42) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(0xffffffffffffffff) 03:33:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x89fa, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[]}) 03:33:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000000)) 03:33:21 executing program 3: getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0x16b) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='bdev#vboxnet1!mime_type\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f0000001800)) getgroups(0x0, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000019c0)=0xe8) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000003380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getresuid(&(0x7f0000003440), &(0x7f0000003480), &(0x7f00000034c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getresgid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4, r1, 0x400002, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) mount(&(0x7f00000006c0), &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)="5dbc3d948123a089da95b5f5ccd24b4d3b2fb93375c404b7bc49c52a3b8d0784fa0068f384988ee0b486bf39a711768d5528b2113624770ec5ac0c971610d22d4d0b", 0x42) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(0xffffffffffffffff) 03:33:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x20000000000) 03:33:21 executing program 5: eventfd2(0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz0'}, 0x4) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000240)) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) setgroups(0x0, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0x60) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000340)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000300)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x20000000000) 03:33:21 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000000)="010000000000001018") 03:33:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4, r1, 0x400002, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) mount(&(0x7f00000006c0), &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)="5dbc3d948123a089da95b5f5ccd24b4d3b2fb93375c404b7bc49c52a3b8d0784fa0068f384988ee0b486bf39a711768d5528b2113624770ec5ac0c971610d22d4d0b", 0x42) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(0xffffffffffffffff) 03:33:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x20000000000) 03:33:21 executing program 2: clock_gettime(0x8000000b, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) getgroups(0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getegid() getpgid(0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@local, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x20000000000) [ 387.201594] autofs4:pid:11421:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.268435456), cmd(0x0000937e) [ 387.251200] autofs4:pid:11421:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 03:33:21 executing program 4: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000005c0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) 03:33:21 executing program 1: timer_create(0xfffffffffffffffd, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) 03:33:22 executing program 3: getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0x16b) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='bdev#vboxnet1!mime_type\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f0000001800)) getgroups(0x0, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000019c0)=0xe8) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000003380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getresuid(&(0x7f0000003440), &(0x7f0000003480), &(0x7f00000034c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getresgid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180), 0x315) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000340)) fchown(r1, r2, r3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000100)={r1}) listen(r1, 0x18) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESOCT=r5]], 0x1) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) 03:33:22 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x59000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)={[{@norock='norock'}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@fragment={0x89, 0x0, 0x0, 0x2, 0x0, 0x1, 0x67}, 0x8) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000340)) [ 387.986542] IPVS: ftp: loaded support on port[0] = 21 [ 388.053693] ISOFS: Unable to identify CD-ROM format. 03:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x77, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) 03:33:22 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) write(r1, &(0x7f0000000080)=':', 0x1) 03:33:22 executing program 4: mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000680)={'trans=unix,'}) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xa8) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0690fef69dc36dd7dec01eece41ff0f0f1aa141000000670fefa20c000000c19086d9f28fc9410feefa6b2179f3acc54d4113fcfbfb0fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298e47a7f") ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000700)) getrandom(&(0x7f0000000080)=""/16, 0xfffffffffffffe7b, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000680)=ANY=[], 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) dup(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) 03:33:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x0, 0x80000001, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x6, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r0, 0x10d, 0x2, &(0x7f0000013ff4)={@remote, @loopback}, 0xc) close(r0) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r0, r1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), 0x10) 03:33:22 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 388.428081] IPVS: ftp: loaded support on port[0] = 21 [ 388.443114] ISOFS: Unable to identify CD-ROM format. 03:33:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 03:33:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x0, 0x80000001, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x6, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r0, 0x10d, 0x2, &(0x7f0000013ff4)={@remote, @loopback}, 0xc) close(r0) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r0, r1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), 0x10) 03:33:23 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)='U', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000317000), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/100, 0x64) 03:33:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x0, 0x80000001, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x6, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r0, 0x10d, 0x2, &(0x7f0000013ff4)={@remote, @loopback}, 0xc) close(r0) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r0, r1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), 0x10) 03:33:23 executing program 3: getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0x16b) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f0000001400)) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='bdev#vboxnet1!mime_type\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f0000001800)) getgroups(0x0, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000019c0)=0xe8) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003280)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000003380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getresuid(&(0x7f0000003440), &(0x7f0000003480), &(0x7f00000034c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) getresgid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x0, 0x80000001, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x6, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r0, 0x10d, 0x2, &(0x7f0000013ff4)={@remote, @loopback}, 0xc) close(r0) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r0, r1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), 0x10) 03:33:25 executing program 2: time(&(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0), 0x4) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000000c0), 0x8) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@xdp, &(0x7f00000001c0)=0x80, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@local, @loopback, @loopback}) time(&(0x7f0000000300)) getpid() gettid() syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000600)="003800000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76bcf544d7ba92dcfdada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a0000000000000000000000", 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000380)='net/xtrm_stat\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x59000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)={[{@norock='norock'}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@fragment={0x89, 0x0, 0x0, 0x2, 0x0, 0x1, 0x67}, 0x8) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000340)) 03:33:25 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="a9", 0x1}], 0x1, 0x0) 03:33:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, r0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000180)) r2 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:33:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}, 0x2d}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:33:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000180), 0x0) 03:33:25 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) [ 391.633725] IPVS: ftp: loaded support on port[0] = 21 03:33:25 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000080)={0xe7e, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x7c9}) 03:33:25 executing program 1: keyctl$set_reqkey_keyring(0x16, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}, 0x2d}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) [ 391.791138] ISOFS: Unable to identify CD-ROM format. 03:33:26 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:33:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f0000000140)=0x80) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) fchown(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, 0xe8) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) getuid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) lstat(&(0x7f0000000b00)='\x00', &(0x7f0000000b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) 03:33:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xfff, 0x6c}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340), 0xd12a03f084855d6) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 03:33:26 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdbb35760a6112546ce45da07121f92afae57b9dfcc7d37fcd421ac92ae3ed5573aa5754d2d924c041a07b30600eeccef6b27454e341dbaa774142f89d945a7b4175dbb7ff3bd5ec5d80e2b2a4ff6ed579285fda4d53f81ddf40e35a39a6a66b2d55468b1e19bffc8de4785c2fc6bd2303ce4348d668910e04b0a2e2bc418861e18081835f36e37248ad6f262665169e4593367fa282e0502c0641a6b5dd944770d731ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7dbd493c866d80000000000000000000000000000"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}, 0x2d}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:33:26 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x59000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)={[{@norock='norock'}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@fragment={0x89, 0x0, 0x0, 0x2, 0x0, 0x1, 0x67}, 0x8) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000340)) [ 392.565779] ISOFS: Unable to identify CD-ROM format. [ 392.577522] IPVS: ftp: loaded support on port[0] = 21 03:33:27 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:27 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r6) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}, 0x2d}) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r8) r10 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000800)=0x2, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r9, r10, r10}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) 03:33:27 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:27 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x59000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)={[{@norock='norock'}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@fragment={0x89, 0x0, 0x0, 0x2, 0x0, 0x1, 0x67}, 0x8) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000340)) 03:33:27 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"98f566d86b94e567c4a2e4508defbb31d82a81aeb9d8d20917cc3feb9887915d0b145b4079d433571660c8a66028e5e1adf7698988f84c632edd1716e0a55408697e2a9a9184f73b22f5e1e2ad9e7b6c55ba32d3d78fb9429650c77fafdab4d9238be585af95205e9841e6867f72a58da08847dd63e1017719046cab9009bcf8cca0557608b775bc13cf5603976679876ef2784c2c3e6dd2886b7066a987e69815efa9e077f28bfaa3dd5de46daaf014c582589abaae8a04e1e29e2bc83ebc61cd9dc35cb1b07d94a5e73ee8b60cacbd94437f856935127ff2ec18495384e587d5b15205bb5439a0e24e4f34e789a6e46d1df8a6135b6710a29a2fd44c21cc53125ec6a2221c97aa4e50e33e2747daf3c77b4cc7fc271e8f9bcf8f3477e1c1bb248d7e37f16431452c4f4d1ac12851f382d75a966c1744ea52bba538ba9815bbdb079cf37cc21fc1ec0a7e0e5f5f9d838b5082180ee38352094e9cb1949ad2f73323792792384e0d447090eefe432793c51fe1b17a4c5ba9f6c8cafce679e78a6df49cabf4d67cadcc3ee7829e94e59d8b0bb0311d70490f50fff41ef9af8385a373a42bb48692b27cd912edf19bb7dfed0e74c5d92789a41a1febe9725ad64e1098bccdcd7aab167417bde780b25ee26ab4ec3111c59c1904b8d1065d67eafcaf23bdd915b612aa543c47017c13c6a8ec7456ea31152f9939997ce190b7668a0bbe1845f245f92a5052d54a53df33d2dad4a1d66488e7089ccf9ff47909e2384d96a64a21d9b3561acfd83a728cb539c0a855fcca9d305013805924e0f51f988b488b522835a19a1edbbf934c5c78c0f715e3219594aa22cb137f591f6be13678f129edacf44a47f4ed9e2aa14fcbab21b4d23300644166da845b287590a033a721605a86aea4720abe6f2a24cb5a9582d77d25a4413aaa8be454c728f29d4f1bb6a642b515ab6c0432e2a2bc751cd93fd6477bba6ec929024359c1c8a674da6ad393245af98621e500a66a5c17e877d658751faecff1c41ae1c34df03caa2a83bf2bf5e88681b0e85abc696cd7ee59ef286fea1883889a16c5a3f08862abdb989554cedcbd0fd377977ee98c81cb2c0d6459d2f37d4adb0def7d9d890f4100709e315387e11d8cefdbb7550025c7777ccc1b10803459a64233192bbf57138bea13ae1050033d139e63b540ad87d98cb584ef9ead904643354eb00cb518b08a1fbeb7063d2c3ff873af51a7a1fa5fa8b2c5b82515cb84e6178422150c620bf038a0ebc49731aa6eb5279f1d50c783230a01b7cd72cb98f72daff729c23986369c1ecafae7c40226b509f2b427c576289f9eceb4253867b5baa1e4763d8e6d4ffcb8fed9b3097b0e9992325705ef393afa4b850e71b5a37ce9b0fd8ce344a2556c73036af62a7dbe03016461e1d6d9363633f148663295d2afdd78b618f05c92"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) [ 393.083244] IPVS: ftp: loaded support on port[0] = 21 03:33:27 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) [ 393.239581] ISOFS: Unable to identify CD-ROM format. 03:33:27 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xfff, 0x6c}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340), 0xd12a03f084855d6) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 03:33:27 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:27 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"98f566d86b94e567c4a2e4508defbb31d82a81aeb9d8d20917cc3feb9887915d0b145b4079d433571660c8a66028e5e1adf7698988f84c632edd1716e0a55408697e2a9a9184f73b22f5e1e2ad9e7b6c55ba32d3d78fb9429650c77fafdab4d9238be585af95205e9841e6867f72a58da08847dd63e1017719046cab9009bcf8cca0557608b775bc13cf5603976679876ef2784c2c3e6dd2886b7066a987e69815efa9e077f28bfaa3dd5de46daaf014c582589abaae8a04e1e29e2bc83ebc61cd9dc35cb1b07d94a5e73ee8b60cacbd94437f856935127ff2ec18495384e587d5b15205bb5439a0e24e4f34e789a6e46d1df8a6135b6710a29a2fd44c21cc53125ec6a2221c97aa4e50e33e2747daf3c77b4cc7fc271e8f9bcf8f3477e1c1bb248d7e37f16431452c4f4d1ac12851f382d75a966c1744ea52bba538ba9815bbdb079cf37cc21fc1ec0a7e0e5f5f9d838b5082180ee38352094e9cb1949ad2f73323792792384e0d447090eefe432793c51fe1b17a4c5ba9f6c8cafce679e78a6df49cabf4d67cadcc3ee7829e94e59d8b0bb0311d70490f50fff41ef9af8385a373a42bb48692b27cd912edf19bb7dfed0e74c5d92789a41a1febe9725ad64e1098bccdcd7aab167417bde780b25ee26ab4ec3111c59c1904b8d1065d67eafcaf23bdd915b612aa543c47017c13c6a8ec7456ea31152f9939997ce190b7668a0bbe1845f245f92a5052d54a53df33d2dad4a1d66488e7089ccf9ff47909e2384d96a64a21d9b3561acfd83a728cb539c0a855fcca9d305013805924e0f51f988b488b522835a19a1edbbf934c5c78c0f715e3219594aa22cb137f591f6be13678f129edacf44a47f4ed9e2aa14fcbab21b4d23300644166da845b287590a033a721605a86aea4720abe6f2a24cb5a9582d77d25a4413aaa8be454c728f29d4f1bb6a642b515ab6c0432e2a2bc751cd93fd6477bba6ec929024359c1c8a674da6ad393245af98621e500a66a5c17e877d658751faecff1c41ae1c34df03caa2a83bf2bf5e88681b0e85abc696cd7ee59ef286fea1883889a16c5a3f08862abdb989554cedcbd0fd377977ee98c81cb2c0d6459d2f37d4adb0def7d9d890f4100709e315387e11d8cefdbb7550025c7777ccc1b10803459a64233192bbf57138bea13ae1050033d139e63b540ad87d98cb584ef9ead904643354eb00cb518b08a1fbeb7063d2c3ff873af51a7a1fa5fa8b2c5b82515cb84e6178422150c620bf038a0ebc49731aa6eb5279f1d50c783230a01b7cd72cb98f72daff729c23986369c1ecafae7c40226b509f2b427c576289f9eceb4253867b5baa1e4763d8e6d4ffcb8fed9b3097b0e9992325705ef393afa4b850e71b5a37ce9b0fd8ce344a2556c73036af62a7dbe03016461e1d6d9363633f148663295d2afdd78b618f05c92"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdbb35760a6112546ce45da07121f92afae57b9dfcc7d37fcd421ac92ae3ed5573aa5754d2d924c041a07b30600eeccef6b27454e341dbaa774142f89d945a7b4175dbb7ff3bd5ec5d80e2b2a4ff6ed579285fda4d53f81ddf40e35a39a6a66b2d55468b1e19bffc8de4785c2fc6bd2303ce4348d668910e04b0a2e2bc418861e18081835f36e37248ad6f262665169e4593367fa282e0502c0641a6b5dd944770d731ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7dbd493c866d80000000000000000000000000000"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:27 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:28 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:28 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000000401fffff77c008ec688c000001018dd"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000013c0), 0x2ca3bfc89d2264d, 0x2, &(0x7f0000000c40)={0x0, 0x989680}) 03:33:28 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdbb35760a6112546ce45da07121f92afae57b9dfcc7d37fcd421ac92ae3ed5573aa5754d2d924c041a07b30600eeccef6b27454e341dbaa774142f89d945a7b4175dbb7ff3bd5ec5d80e2b2a4ff6ed579285fda4d53f81ddf40e35a39a6a66b2d55468b1e19bffc8de4785c2fc6bd2303ce4348d668910e04b0a2e2bc418861e18081835f36e37248ad6f262665169e4593367fa282e0502c0641a6b5dd944770d731ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7dbd493c866d80000000000000000000000000000"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:28 executing program 1: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600), &(0x7f0000000300), 0xfffffe4a, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f0000000540)) getuid() stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) getresgid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) 03:33:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)="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") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000280)}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) [ 394.138406] device lo entered promiscuous mode 03:33:28 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"98f566d86b94e567c4a2e4508defbb31d82a81aeb9d8d20917cc3feb9887915d0b145b4079d433571660c8a66028e5e1adf7698988f84c632edd1716e0a55408697e2a9a9184f73b22f5e1e2ad9e7b6c55ba32d3d78fb9429650c77fafdab4d9238be585af95205e9841e6867f72a58da08847dd63e1017719046cab9009bcf8cca0557608b775bc13cf5603976679876ef2784c2c3e6dd2886b7066a987e69815efa9e077f28bfaa3dd5de46daaf014c582589abaae8a04e1e29e2bc83ebc61cd9dc35cb1b07d94a5e73ee8b60cacbd94437f856935127ff2ec18495384e587d5b15205bb5439a0e24e4f34e789a6e46d1df8a6135b6710a29a2fd44c21cc53125ec6a2221c97aa4e50e33e2747daf3c77b4cc7fc271e8f9bcf8f3477e1c1bb248d7e37f16431452c4f4d1ac12851f382d75a966c1744ea52bba538ba9815bbdb079cf37cc21fc1ec0a7e0e5f5f9d838b5082180ee38352094e9cb1949ad2f73323792792384e0d447090eefe432793c51fe1b17a4c5ba9f6c8cafce679e78a6df49cabf4d67cadcc3ee7829e94e59d8b0bb0311d70490f50fff41ef9af8385a373a42bb48692b27cd912edf19bb7dfed0e74c5d92789a41a1febe9725ad64e1098bccdcd7aab167417bde780b25ee26ab4ec3111c59c1904b8d1065d67eafcaf23bdd915b612aa543c47017c13c6a8ec7456ea31152f9939997ce190b7668a0bbe1845f245f92a5052d54a53df33d2dad4a1d66488e7089ccf9ff47909e2384d96a64a21d9b3561acfd83a728cb539c0a855fcca9d305013805924e0f51f988b488b522835a19a1edbbf934c5c78c0f715e3219594aa22cb137f591f6be13678f129edacf44a47f4ed9e2aa14fcbab21b4d23300644166da845b287590a033a721605a86aea4720abe6f2a24cb5a9582d77d25a4413aaa8be454c728f29d4f1bb6a642b515ab6c0432e2a2bc751cd93fd6477bba6ec929024359c1c8a674da6ad393245af98621e500a66a5c17e877d658751faecff1c41ae1c34df03caa2a83bf2bf5e88681b0e85abc696cd7ee59ef286fea1883889a16c5a3f08862abdb989554cedcbd0fd377977ee98c81cb2c0d6459d2f37d4adb0def7d9d890f4100709e315387e11d8cefdbb7550025c7777ccc1b10803459a64233192bbf57138bea13ae1050033d139e63b540ad87d98cb584ef9ead904643354eb00cb518b08a1fbeb7063d2c3ff873af51a7a1fa5fa8b2c5b82515cb84e6178422150c620bf038a0ebc49731aa6eb5279f1d50c783230a01b7cd72cb98f72daff729c23986369c1ecafae7c40226b509f2b427c576289f9eceb4253867b5baa1e4763d8e6d4ffcb8fed9b3097b0e9992325705ef393afa4b850e71b5a37ce9b0fd8ce344a2556c73036af62a7dbe03016461e1d6d9363633f148663295d2afdd78b618f05c92"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:28 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}], 0x30, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r4, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r4, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x88, @rand_addr=0x8, 0x4e23, 0x2, 'sh\x00', 0x21, 0x0, 0x29}, {@loopback, 0x4e23, 0x0, 0x17, 0x3, 0x101}}, 0x44) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:33:28 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x7, 0x4) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000005c0)={0x6, 0x5, 0xadf, 0x8}, &(0x7f0000000600)=0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x90000) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/47) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240), &(0x7f0000000280)='/dev/amidi#\x00', 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) clock_gettime(0x5, &(0x7f0000000400)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) 03:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xfff, 0x6c}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340), 0xd12a03f084855d6) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 03:33:28 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x7, 0x4) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000005c0)={0x6, 0x5, 0xadf, 0x8}, &(0x7f0000000600)=0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x90000) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/47) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240), &(0x7f0000000280)='/dev/amidi#\x00', 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) clock_gettime(0x5, &(0x7f0000000400)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) 03:33:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) write$FUSE_INIT(r1, &(0x7f0000000480)={0x50, 0xfffffffffffffff5}, 0x50) 03:33:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) 03:33:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xfff, 0x6c}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340), 0xd12a03f084855d6) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 03:33:29 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x7, 0x4) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000005c0)={0x6, 0x5, 0xadf, 0x8}, &(0x7f0000000600)=0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x90000) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/47) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240), &(0x7f0000000280)='/dev/amidi#\x00', 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) clock_gettime(0x5, &(0x7f0000000400)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) 03:33:30 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x7, 0x4) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000005c0)={0x6, 0x5, 0xadf, 0x8}, &(0x7f0000000600)=0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x90000) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/47) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240), &(0x7f0000000280)='/dev/amidi#\x00', 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) clock_gettime(0x5, &(0x7f0000000400)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) 03:33:30 executing program 2: clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:30 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getpgid(0xffffffffffffffff) gettid() fcntl$getown(0xffffffffffffffff, 0x9) gettid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000600)) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) accept(0xffffffffffffffff, &(0x7f0000000200)=@un=@abs, &(0x7f0000000280)=0x45) syz_open_dev$mice(&(0x7f0000001e40)='/dev/input/mice\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000001f00)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000001f40)=0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001f80)) open(&(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpgid(0x0) gettid() pipe2(&(0x7f0000000340), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/cuse\x00', 0x2, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='io\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000001b80), 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000140)) eventfd(0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:30 executing program 1: futex(&(0x7f0000000040), 0xfffffffffffffffc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f0000000500)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000045c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getegid() getresuid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)) lstat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007400)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in=@loopback}}}, &(0x7f0000007500)=0xe8) getegid() getuid() getresgid(&(0x7f0000007540), &(0x7f0000007580), &(0x7f00000075c0)) stat(&(0x7f0000007980)='./file0\x00', &(0x7f00000079c0)) fstat(0xffffffffffffffff, &(0x7f0000007a40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ac0)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000007bc0)=0xe8) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000480)) 03:33:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) sendmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 03:33:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb}]}}}]}, 0x3c}}, 0x0) 03:33:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x3, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 396.573135] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 03:33:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xb, &(0x7f00000001c0)) 03:33:31 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x948) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000984ff4)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000200)={0x20000006}) 03:33:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xb, &(0x7f00000001c0)) 03:33:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) seccomp(0x0, 0x0, &(0x7f0000000100)) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[], 0x0, 0x0) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ustat(0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') close(0xffffffffffffffff) pipe(&(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:33:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xb, &(0x7f00000001c0)) 03:33:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xb, &(0x7f00000001c0)) 03:33:31 executing program 5: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:31 executing program 2: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000000140)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000400)) setgid(0x0) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000004440)=ANY=[], 0x0, 0x0) prctl$getreaper(0x0, &(0x7f0000000300)) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001680)={'#! ', './file0'}, 0xb) getpid() recvmsg(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000340)=@ax25, 0x80, &(0x7f0000001840), 0x0, &(0x7f00000018c0)=""/165, 0xa5}, 0x0) request_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000500), &(0x7f0000000580)='/dev/zero\x00', 0xfffffffffffffffc) socket$inet6(0xa, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000740)=""/36, 0x24) getdents64(0xffffffffffffffff, &(0x7f0000000640)=""/214, 0xd6) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) getpriority(0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000500), 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f0000004040)) syz_execute_func(&(0x7f00000005c0)="428055a0690fef69dc00d9ce2e470f180a1837370f38211ad092f1000000c19086d9f28fc9410feefa4e2179fb660ffe61e24175450f2e1ac4010d64ac1e5d31a3b706e2989f7b") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@local}, &(0x7f0000004500)=0x14) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000540)) 03:33:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) accept(r0, 0x0, &(0x7f00000001c0)) 03:33:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, 0x0) setuid(0x0) 03:33:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x3, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 03:33:31 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0xb) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) getegid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:33:32 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) syslog(0x3, 0xffffffffffffffff, 0xaf) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/226) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)) 03:33:32 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0xe78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x0, &(0x7f0000000080), &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local, [], @link_local, [], 0x938, 0xab0, 0xae0, [@among={'among\x00', 0x850, {{0x1, 0x0, 0x0, {[], 0x1, [{[], @dev}]}, {[], 0x3, [{[], @dev}, {[], @local}, {[], @broadcast}]}}}}, @helper={'helper\x00', 0x28, {{0x0, 'H.245\x00'}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast, [], @broadcast, [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0xef0) 03:33:32 executing program 4: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@dev}}, {{@in6}}}, &(0x7f0000000800)=0xe8) getegid() fchown(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000500)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) 03:33:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x3, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 03:33:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000002c0)={0x0, 0x7fffffff}, 0x8) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)) listen(r1, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0, {0xa, 0x0, 0xda, @loopback, 0x8}}}, 0x3a) timerfd_create(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) socketpair(0x0, 0x6, 0x0, &(0x7f00000001c0)) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x100, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0xcd, 0x20000004, &(0x7f0000b63fe4), 0x1c) 03:33:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x37}) 03:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)="0000d0d3261b3fd41e2000000eb81e00", 0x2, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}, 0x1e) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) accept$unix(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x6e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x200100, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f00000008c0)) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x1, &(0x7f0000000700)=[{&(0x7f0000000640)="e9daa7ca72d2c1a9aa3d7c324a27a2849e74500b65739558065bd1d1bc1cb9a986feaa6d2465eae088d062f9a0f82f32e4eb313518431b414fcd146e47fe85947d203309e4baf0afe4e163141dfe1aad5a262996caf41b4ef55f12761d297af51bdf0baa8ff6c9100239b1c936f6e85742da7e613e491860d7e3f3c86eb2a80e6f42482f2195448dd11d", 0x8a, 0xdc09}], 0x90, &(0x7f00000001c0)=ANY=[]) msgget(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000900)) 03:33:33 executing program 3: prctl$setmm(0x7, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:33 executing program 5: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) setuid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:33 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="1f0000001800030007fffd946fa283bc80200000000400051f1d8568080002", 0x1f}], 0x1}, 0x0) 03:33:33 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000049c0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004ac0)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:33 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000005c0)=""/4096, 0x1000}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000015c0), &(0x7f0000001600)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001640), &(0x7f0000001680)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 399.054079] FAT-fs (loop2): bogus number of reserved sectors [ 399.077717] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x3, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 03:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)="0000d0d3261b3fd41e2000000eb81e00", 0x2, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}, 0x1e) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) accept$unix(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x6e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x200100, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f00000008c0)) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x1, &(0x7f0000000700)=[{&(0x7f0000000640)="e9daa7ca72d2c1a9aa3d7c324a27a2849e74500b65739558065bd1d1bc1cb9a986feaa6d2465eae088d062f9a0f82f32e4eb313518431b414fcd146e47fe85947d203309e4baf0afe4e163141dfe1aad5a262996caf41b4ef55f12761d297af51bdf0baa8ff6c9100239b1c936f6e85742da7e613e491860d7e3f3c86eb2a80e6f42482f2195448dd11d", 0x8a, 0xdc09}], 0x90, &(0x7f00000001c0)=ANY=[]) msgget(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000900)) 03:33:34 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 03:33:34 executing program 3: times(&(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000006c0)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 03:33:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x24f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 03:33:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) [ 400.108923] FAT-fs (loop2): bogus number of reserved sectors 03:33:34 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpid() prctl$setmm(0x23, 0xf, &(0x7f0000ffc000/0x1000)=nil) [ 400.149903] FAT-fs (loop2): Can't find a valid FAT filesystem [ 400.239388] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 03:33:34 executing program 5: unshare(0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900770f78993d233d23410feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") modify_ldt$read(0x0, &(0x7f0000001800)=""/58, 0x3a) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30}, 0xffffffffffffffa5) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000600)=ANY=[], &(0x7f0000000580)) geteuid() socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000005c0)={'lo\x00', {0x2, 0x0, @broadcast}}) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@remote, @in6}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000640), &(0x7f0000000680)=0x40) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)) geteuid() getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000004c0), 0x24, 0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) 03:33:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) 03:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)="0000d0d3261b3fd41e2000000eb81e00", 0x2, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}, 0x1e) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) accept$unix(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x6e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x200100, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f00000008c0)) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x1, &(0x7f0000000700)=[{&(0x7f0000000640)="e9daa7ca72d2c1a9aa3d7c324a27a2849e74500b65739558065bd1d1bc1cb9a986feaa6d2465eae088d062f9a0f82f32e4eb313518431b414fcd146e47fe85947d203309e4baf0afe4e163141dfe1aad5a262996caf41b4ef55f12761d297af51bdf0baa8ff6c9100239b1c936f6e85742da7e613e491860d7e3f3c86eb2a80e6f42482f2195448dd11d", 0x8a, 0xdc09}], 0x90, &(0x7f00000001c0)=ANY=[]) msgget(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000900)) 03:33:34 executing program 0: chmod(&(0x7f0000000140)='./file0\x00', 0x0) getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000014c0)={0x14}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) exit(0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 400.529907] tmpfs: No value for mount option 'd' 03:33:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) 03:33:34 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) [ 400.734038] FAT-fs (loop2): bogus number of reserved sectors [ 400.754804] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)="0000d0d3261b3fd41e2000000eb81e00", 0x2, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}, 0x1e) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) accept$unix(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x6e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x200100, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f00000008c0)) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x1, &(0x7f0000000700)=[{&(0x7f0000000640)="e9daa7ca72d2c1a9aa3d7c324a27a2849e74500b65739558065bd1d1bc1cb9a986feaa6d2465eae088d062f9a0f82f32e4eb313518431b414fcd146e47fe85947d203309e4baf0afe4e163141dfe1aad5a262996caf41b4ef55f12761d297af51bdf0baa8ff6c9100239b1c936f6e85742da7e613e491860d7e3f3c86eb2a80e6f42482f2195448dd11d", 0x8a, 0xdc09}], 0x90, &(0x7f00000001c0)=ANY=[]) msgget(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000900)) 03:33:35 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001340)={&(0x7f0000001040), 0xc, &(0x7f0000001300)={&(0x7f00000011c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in6=@loopback}, {@in=@multicast2, 0x0, 0x6c}, @in6=@remote}, 0x0, 0xfffffffffffffffc}}, 0xf8}}, 0x0) 03:33:35 executing program 4: memfd_create(&(0x7f0000000080)='systemem0\x00', 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x1db, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) getuid() lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000900)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000ac0)=0xae36c5fcdbe860e2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) gettid() [ 401.181028] FAT-fs (loop2): bogus number of reserved sectors [ 401.219910] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:35 executing program 5: unshare(0x8020000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) 03:33:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:35 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) getegid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@local}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0be6969ef69dc00d96441fb0f1837370f38211a2e26f0011479c19086d9f28fc9410feefa4e2179fb010175450f2e1ac4010d64ac1e5d31a3b767e2989fc4e279795728") 03:33:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:33:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000700)={0x0}) io_getevents(r1, 0x7, 0xa41, &(0x7f0000000240)=[{}], &(0x7f0000000280)={r2}) clone(0x0, &(0x7f00000012c0), &(0x7f00000001c0), &(0x7f00000022c0), &(0x7f0000002300)) io_destroy(r1) 03:33:36 executing program 5: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002400075e1dfffd946fa2830020200a000800000000002000f1ffffffff00ff7e280000001100ffff7e63975c0ac47a6268e3406cf055d90f15a30000000000000000000000000000", 0x4c}], 0x1}, 0x0) 03:33:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) mremap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 03:33:36 executing program 0: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000540), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000500), &(0x7f0000000340)=0x164) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000480), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 401.802700] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:33:36 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") getrandom(&(0x7f0000000000), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xec4, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 03:33:36 executing program 4: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8001, &(0x7f0000000040), 0x800, 0x0) 03:33:36 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) syz_emit_ethernet(0x16, &(0x7f00000006c0)={@broadcast, @empty, [], {@llc_tr={0x11, {@snap={0x0, 0x0, 'm', "e4fedc"}}}}}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:36 executing program 3: getitimer(0x0, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000740), 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040), 0x9, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0xc000) accept$alg(r1, 0x0, 0x0) 03:33:36 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") getrandom(&(0x7f0000000000), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xec4, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 03:33:36 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000240)="00e8028c0f000000000010fffffffffeff010400000000"}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:36 executing program 2: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) lseek(r0, 0x7ffffffffffffffe, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 03:33:36 executing program 4: timerfd_create(0x0, 0x500) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:36 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") getrandom(&(0x7f0000000000), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xec4, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 03:33:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) 03:33:37 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0xe8) 03:33:37 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f0000000100), 0xc, &(0x7f0000beeff0)={&(0x7f00000002c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@dev, @in=@rand_addr}, {@in6=@mcast2}, @in6=@ipv4}}, 0xf0}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) sched_setattr(0x0, &(0x7f0000000200), 0x0) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)=@xdp, 0x80, &(0x7f00000003c0)}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x40}, 0x28, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:37 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") getrandom(&(0x7f0000000000), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xec4, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 03:33:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10e4ffffff06000000000000ddff0000"], 0x10}, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0xc}], 0xc}}], 0xb, 0x0) 03:33:37 executing program 3: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:37 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/42) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x2, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x8001, 0x202000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYPTR, @ANYPTR], &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) signalfd(r2, &(0x7f00000002c0)={0x3}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000480)=r4, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r5, &(0x7f0000000600)="033249da95f3814f5c88332077ea0353b6fb5dee30f7ef66cbdbd2595be6a2eb1f5d4dbc9a7b02756b35da3d19b1d65d352945060000004453199685f1bc57c6c7f93b905d946d56430a21e7e84871fcb711f149bc9ba9f8bd5edfc5e7d9447cd29bd09bc06e388be77637127dc30a69cc2b8d7154f7f56b249bfb34c0a28358015771005fc3e67667dd6f96167a2e60d75225965e2319dca90b5f8a0dc8bd9909e6ddced2bfdd12248d57ba2db2f2c0bb0dd5a776217e01cfa084fbbd35e9c864007482d788c22adc44"}, 0x10) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000003c0)={r4, 0x9, 0x8}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x40) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000340)={0x0, r5}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r4, 0x101}, &(0x7f0000000280)=0xfffffffffffffe91) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x3}, &(0x7f00000001c0)=0x8) 03:33:37 executing program 5: bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0), 0x1}, 0x20) 03:33:37 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000001680)) 03:33:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000300)=0x8) 03:33:37 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/42) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x2, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x8001, 0x202000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYPTR, @ANYPTR], &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) signalfd(r2, &(0x7f00000002c0)={0x3}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000480)=r4, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r5, &(0x7f0000000600)="033249da95f3814f5c88332077ea0353b6fb5dee30f7ef66cbdbd2595be6a2eb1f5d4dbc9a7b02756b35da3d19b1d65d352945060000004453199685f1bc57c6c7f93b905d946d56430a21e7e84871fcb711f149bc9ba9f8bd5edfc5e7d9447cd29bd09bc06e388be77637127dc30a69cc2b8d7154f7f56b249bfb34c0a28358015771005fc3e67667dd6f96167a2e60d75225965e2319dca90b5f8a0dc8bd9909e6ddced2bfdd12248d57ba2db2f2c0bb0dd5a776217e01cfa084fbbd35e9c864007482d788c22adc44"}, 0x10) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000003c0)={r4, 0x9, 0x8}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x40) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000340)={0x0, r5}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r4, 0x101}, &(0x7f0000000280)=0xfffffffffffffe91) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x3}, &(0x7f00000001c0)=0x8) 03:33:37 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000080), 0x0) syncfs(0xffffffffffffffff) getresuid(&(0x7f0000000300), &(0x7f0000000440), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getgroups(0x0, &(0x7f0000000680)) getresgid(&(0x7f00000006c0), &(0x7f0000000780), &(0x7f00000007c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) setxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c00), 0x24, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=""/19}, 0x18) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getgroups(0x0, &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) getgid() getgid() getgroups(0x0, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000c80)=ANY=[], &(0x7f0000000740)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getgroups(0x0, &(0x7f0000000440)) 03:33:38 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/42) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x2, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x8001, 0x202000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYPTR, @ANYPTR], &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) signalfd(r2, &(0x7f00000002c0)={0x3}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000480)=r4, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r5, &(0x7f0000000600)="033249da95f3814f5c88332077ea0353b6fb5dee30f7ef66cbdbd2595be6a2eb1f5d4dbc9a7b02756b35da3d19b1d65d352945060000004453199685f1bc57c6c7f93b905d946d56430a21e7e84871fcb711f149bc9ba9f8bd5edfc5e7d9447cd29bd09bc06e388be77637127dc30a69cc2b8d7154f7f56b249bfb34c0a28358015771005fc3e67667dd6f96167a2e60d75225965e2319dca90b5f8a0dc8bd9909e6ddced2bfdd12248d57ba2db2f2c0bb0dd5a776217e01cfa084fbbd35e9c864007482d788c22adc44"}, 0x10) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000003c0)={r4, 0x9, 0x8}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x40) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000340)={0x0, r5}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r4, 0x101}, &(0x7f0000000280)=0xfffffffffffffe91) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x3}, &(0x7f00000001c0)=0x8) 03:33:38 executing program 4: clock_gettime(0xb, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) 03:33:39 executing program 3: pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) inotify_init1(0x0) fcntl$getown(0xffffffffffffffff, 0x9) epoll_create(0x0) syncfs(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffb) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000500), &(0x7f0000000540)=0xc) request_key(&(0x7f00000002c0)='id_legacy\x00', &(0x7f0000000300), &(0x7f0000000340)='&\x00', 0xfffffffffffffffb) keyctl$link(0x8, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) fstat(0xffffffffffffffff, &(0x7f00000003c0)) quotactl(0x0, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000440)) sched_getparam(0x0, &(0x7f00000000c0)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:39 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/42) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x2, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x8001, 0x202000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYRESDEC=r1, @ANYPTR, @ANYPTR], &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) signalfd(r2, &(0x7f00000002c0)={0x3}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000480)=r4, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r5, &(0x7f0000000600)="033249da95f3814f5c88332077ea0353b6fb5dee30f7ef66cbdbd2595be6a2eb1f5d4dbc9a7b02756b35da3d19b1d65d352945060000004453199685f1bc57c6c7f93b905d946d56430a21e7e84871fcb711f149bc9ba9f8bd5edfc5e7d9447cd29bd09bc06e388be77637127dc30a69cc2b8d7154f7f56b249bfb34c0a28358015771005fc3e67667dd6f96167a2e60d75225965e2319dca90b5f8a0dc8bd9909e6ddced2bfdd12248d57ba2db2f2c0bb0dd5a776217e01cfa084fbbd35e9c864007482d788c22adc44"}, 0x10) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000003c0)={r4, 0x9, 0x8}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x40) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000340)={0x0, r5}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000140)={r4, 0x101}, &(0x7f0000000280)=0xfffffffffffffe91) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x3}, &(0x7f00000001c0)=0x8) 03:33:39 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000006700), 0x0, 0x0, &(0x7f0000006980)) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000440)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000900), 0x14) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_gettime(0x0, &(0x7f00000069c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000039c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='byz0\x00', 0x200002, 0x0) gettid() ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000940), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000006a40)) 03:33:39 executing program 0: keyctl$setperm(0x5, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") gettid() ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/89) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) 03:33:39 executing program 4: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x0, @loopback}, 0xe, &(0x7f0000000200), 0xffffffff}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@remote, @ipv4={[], [], @dev}, @remote}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000540)=0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) ioprio_set$pid(0x2, 0x0, 0x0) 03:33:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) prctl$setmm(0x4, 0x0, &(0x7f0000ff9000/0x4000)=nil) 03:33:39 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001140)) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000940)}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6, @in=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c40)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000d40)) getgroups(0x0, &(0x7f0000000f00)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001180)) fstat(0xffffffffffffffff, &(0x7f0000001200)) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000001280), 0x24, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) readlink(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)=""/57, 0x39) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340), 0xc, &(0x7f0000000500)={&(0x7f00000007c0)=ANY=[]}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x0, 0x0) memfd_create(&(0x7f00000005c0)='\x00', 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000600)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) getdents(0xffffffffffffffff, &(0x7f0000001040)=""/82, 0x52) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000010c0)) 03:33:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180)) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="f8c3d920000523d32cdc527492b4f814dcb89f362b67637370ff0f0000191e372755471404753bd62b09faa1894a16822df89d180c586324a70ce7a5ff2c33dc72e640451abd763e2a9e762b185af076cdbae0d9c2f4cba7322221b64bbf1a88f616ce2324f985d0d94913"], 0x6b) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 03:33:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143}, 0x28) [ 405.462758] protocol 88a8 is buggy, dev gre0 [ 405.479598] protocol 88a8 is buggy, dev gre0 03:33:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143}, 0x28) [ 405.698664] protocol 88a8 is buggy, dev gre0 03:33:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143}, 0x28) [ 405.881827] protocol 88a8 is buggy, dev gre0 03:33:40 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000dc0)=0xe8) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:40 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:33:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000180)={0x43, 0x75, 0x2, {0x38, "e82fbaaa6a6274aa5cee1a4ff98c3cfe2cebeb6a3b9f04dd2d42cc29d24f9aa8c1797debd1c869c7cc61a292a6f452459f84d837a445a23a"}}, 0x43) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 03:33:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143}, 0x28) 03:33:40 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000200)=0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x0, 0x0) poll(&(0x7f0000000300), 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000300)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000940)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000006c0)}, &(0x7f0000000640)=0x10) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) readv(0xffffffffffffffff, &(0x7f0000000a80), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") [ 406.092676] protocol 88a8 is buggy, dev gre0 03:33:40 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='^vmnet1posix_acl_access+vboxnet1\x00', 0x0) fsetxattr(r0, &(0x7f0000000240)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='security.ima\x00', 0x103, 0x0) capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000080)) flistxattr(r0, &(0x7f0000000200)=""/26, 0x8973f473ee7fadf9) 03:33:40 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@llc, &(0x7f0000000280)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c40)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001080)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in, @in6=@mcast2}}, {{@in6=@local}}}, &(0x7f00000011c0)=0xe8) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000012c0)) geteuid() getgid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getgroups(0x0, &(0x7f0000001800)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001840)) fstat(0xffffffffffffffff, &(0x7f0000001880)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in=@loopback, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001ec0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002000)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in=@multicast1}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002740)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002a40), 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 406.265545] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) 03:33:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000180)={0x43, 0x75, 0x2, {0x38, "e82fbaaa6a6274aa5cee1a4ff98c3cfe2cebeb6a3b9f04dd2d42cc29d24f9aa8c1797debd1c869c7cc61a292a6f452459f84d837a445a23a"}}, 0x43) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 03:33:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:33:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000180)={0x43, 0x75, 0x2, {0x38, "e82fbaaa6a6274aa5cee1a4ff98c3cfe2cebeb6a3b9f04dd2d42cc29d24f9aa8c1797debd1c869c7cc61a292a6f452459f84d837a445a23a"}}, 0x43) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 03:33:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000180)={0x43, 0x75, 0x2, {0x38, "e82fbaaa6a6274aa5cee1a4ff98c3cfe2cebeb6a3b9f04dd2d42cc29d24f9aa8c1797debd1c869c7cc61a292a6f452459f84d837a445a23a"}}, 0x43) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 03:33:41 executing program 1: prctl$intptr(0x80000001b, 0x0) syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6}, &(0x7f0000000780)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000007c0), &(0x7f0000000880)=0x8) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000500)=0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000600), &(0x7f0000000640)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) 03:33:41 executing program 3: clock_gettime(0xb, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x18b) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000046c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:41 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000140)) r2 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000002c0)=r2) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)) 03:33:41 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000300)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1, 0x0) close(r2) 03:33:41 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:41 executing program 4: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:41 executing program 5: seccomp(0x2, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='{\x00', 0xffffffffffffff9c}, 0x10) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000034000)=""/144, &(0x7f00000000c0)=0xfffffffffffffe3e) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640), 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{}, {}, 0x0, {0x2, 0x0, @dev}, 'syzkaller0\x00'}) getgroups(0x0, &(0x7f0000000440)) 03:33:41 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x5423) 03:33:42 executing program 2: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:42 executing program 4: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) restart_syscall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) socket$inet6(0xa, 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000013c0)={{{@in6=@local, @in6=@mcast2}}, {{@in6}}}, &(0x7f00000014c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001580)={@broadcast, @broadcast}, &(0x7f00000015c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xffffffffffffff1b) accept4$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001780)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@local, @dev}, &(0x7f0000000a40)=0x6d0fa773ca4a6d0a) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @loopback, @multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @remote, @rand_addr}, &(0x7f0000001900)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002100)={@rand_addr}, &(0x7f0000002140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002600)={0x0, @multicast1}, &(0x7f0000002640)=0xc) accept4(0xffffffffffffffff, &(0x7f0000004300)=@can, &(0x7f0000004380)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000ad00), 0x0, 0x0, &(0x7f000000aec0)={0x0, 0x989680}) getpeername(0xffffffffffffffff, &(0x7f000000af00)=@xdp, &(0x7f000000af80)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xfffffffffffffe99) recvmsg(0xffffffffffffffff, &(0x7f000000c540)={&(0x7f000000b300)=@hci, 0x80, &(0x7f000000c440), 0x0, &(0x7f000000c480)=""/151, 0x97}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c680)=0x14) accept4(0xffffffffffffffff, &(0x7f000000e080)=@xdp, &(0x7f000000e100)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000e140)={@empty, @multicast2}, &(0x7f000000e180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000e1c0)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast1}}, &(0x7f000000e2c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e300)={{{@in=@multicast2, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000e400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000e500), &(0x7f000000e540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000e800)={'bcsh0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000e840)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000e980)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f000000ea80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f6c0)={&(0x7f0000000400), 0xc, &(0x7f000000f680)={&(0x7f0000002680)=ANY=[]}}, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) syz_execute_func(&(0x7f0000000980)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:42 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:42 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x3, &(0x7f0000000080)) utime(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) 03:33:42 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:42 executing program 0: clock_gettime(0x9, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:33:43 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:43 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="0024ade3c90400000054db5f92100e4b64e4e802616870ffff9bd1aa35bbc9f9d109ee6018288d7a750e92c6434a824e0b82653618b4fc664de3"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x72) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f0000000580)={@mcast1, 0x70, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="9605b49a1a5961dbee6b714c33d47039d14b41972907000000fc812a7e45004a99a4f9a89bebad76b8756106fd85bd0000000000000000000060a3e964525fd745a96376667ff7d31a0598d9737994166aed12bf776acecf2173911527448d5c29d29896fdb44e32623e74aa"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:33:43 executing program 2: clock_getres(0xb9010000, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) rt_sigreturn() clock_gettime(0x0, &(0x7f0000000080)) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x7530}}, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@dev}, &(0x7f0000000800)=0x14) 03:33:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 03:33:43 executing program 3: clock_gettime(0x4, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x14) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000240)={0x20}, 0x20) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) syz_execute_func(&(0x7f00000000c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34068}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[]}}, 0x0) 03:33:43 executing program 1: keyctl$invalidate(0x11, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:43 executing program 4: socket$inet(0x2, 0x20000010000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000001340)={0x0, &(0x7f0000001300)}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 03:33:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 03:33:43 executing program 0: inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB]) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000140)=0x30) 03:33:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 03:33:44 executing program 0: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d40)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 5: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000140)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180), 0xc, &(0x7f0000000700)={&(0x7f0000000340)=ANY=[]}}, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) syz_execute_func(&(0x7f0000000540)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") open_by_handle_at(0xffffffffffffffff, &(0x7f0000000800)={0x8}, 0x0) inotify_init() sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[]}}, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x0) 03:33:44 executing program 1: gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) add_key(0xfffffffffffffffd, &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000580)='id_resolver\x00', &(0x7f00000005c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) keyctl$assume_authority(0x1d, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) gettid() gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:44 executing program 2: clock_gettime(0x4, &(0x7f0000001140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x19, 0x201, 0x0, 0x0, {0x1d}}, 0x14}}, 0x0) 03:33:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 03:33:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f"], 0x1) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, &(0x7f0000000240), 0x2) 03:33:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x0, 0x0, 0x4}, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="d62ae2820002000097"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5f}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 03:33:45 executing program 3: ustat(0x700, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000200)) personality(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000300)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe801, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200020000f801", 0x17}], 0x0, &(0x7f0000000000)={[{@fat=@allow_utime={'allow_utime'}}]}) 03:33:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) [ 410.843937] FAT-fs (loop0): Directory bread(block 2563) failed [ 410.880879] FAT-fs (loop0): Directory bread(block 2564) failed [ 410.908514] FAT-fs (loop0): Directory bread(block 2565) failed [ 410.928615] FAT-fs (loop0): Directory bread(block 2566) failed [ 410.951188] FAT-fs (loop0): Directory bread(block 2567) failed [ 410.973621] FAT-fs (loop0): Directory bread(block 2568) failed [ 410.993571] FAT-fs (loop0): Directory bread(block 2569) failed [ 411.020208] FAT-fs (loop0): Directory bread(block 2570) failed [ 411.026229] FAT-fs (loop0): Directory bread(block 2571) failed [ 411.050731] FAT-fs (loop0): Directory bread(block 2572) failed 03:33:45 executing program 2: add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0)="91", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000001a40)='keyring\x00', &(0x7f0000000400), &(0x7f0000000440)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:45 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x2d, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x15) 03:33:45 executing program 0: sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x0) clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0xffffffba}, 0x1e7) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:45 executing program 1: accept(0xffffffffffffff9c, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x80) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001580), 0x0, &(0x7f00000015c0)=""/135, 0x87}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000006440), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x14) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000580), 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000006640), &(0x7f0000006680)=0x8) dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000066c0), &(0x7f0000006700)=0x20) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) membarrier(0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) getgroups(0x0, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getgroups(0x0, &(0x7f0000000d80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002680)={{{@in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000002780)=0xe8) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) fstat(0xffffffffffffffff, &(0x7f0000002940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000029c0)) lstat(&(0x7f0000002a00)='./file0/file0\x00', &(0x7f0000002a40)) fstat(0xffffffffffffffff, &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e80), &(0x7f0000002ec0)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005880), &(0x7f00000058c0)=0xc) lstat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) fstat(0xffffffffffffffff, &(0x7f00000059c0)) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005a40)={{{@in6=@remote, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000005b40)=0xe8) stat(&(0x7f0000005b80)='./file0/file0\x00', &(0x7f0000005bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c40), &(0x7f0000005c80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005cc0)) getegid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d40), &(0x7f0000005d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005dc0), &(0x7f0000005e00)=0xc) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005e40), &(0x7f0000005e80)=0xc) getegid() getpid() stat(&(0x7f00000061c0)='./file0\x00', &(0x7f0000006200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006280), &(0x7f00000062c0)=0xc) getpid() lstat(&(0x7f0000006300)='./file0\x00', &(0x7f0000006340)) fstat(0xffffffffffffffff, &(0x7f00000063c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 03:33:45 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000002c0)={"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"}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='statm\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000006c0)={0x28}, 0x28) accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) 03:33:45 executing program 3: syslog(0x3, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getuid() getgroups(0x0, &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000d40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d80)) getresuid(&(0x7f0000000dc0), &(0x7f00000000c0), &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001180)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001340)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001380)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000001480)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:46 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x208800) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(0xffffffffffffffff, &(0x7f0000000280)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getuid() 03:33:46 executing program 1: semget$private(0xffffff7f, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)="81", 0x0) syz_open_dev$sndseq(&(0x7f0000f36000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "42fe0f10d5e2d365", "441b3862aa98d34bdd2c624dfeafedf7eef75146a5c373bd269372bc7fe0dbf4"}) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340), &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, "7175657565310000000000000000000000000000000000000000000000000000000013000000000000000000000000000000000000000f00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000044000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000000)) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f00000024c0)={0x0, 0x0, 0x2080}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:33:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 03:33:46 executing program 0: unshare(0x8020000) semget$private(0x0, 0x5, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') semop(0x0, &(0x7f0000000100)=[{0x0, 0x9, 0x1800}, {0x0, 0x7fffffff}], 0x2) setns(r0, 0x0) 03:33:46 executing program 0: unshare(0x8020000) semget$private(0x0, 0x5, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') semop(0x0, &(0x7f0000000100)=[{0x0, 0x9, 0x1800}, {0x0, 0x7fffffff}], 0x2) setns(r0, 0x0) 03:33:46 executing program 3: ioperm(0x0, 0x101, 0x3) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @local}, &(0x7f00000005c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @rand_addr, @multicast2}, &(0x7f0000001180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast1}, &(0x7f0000001200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @multicast1}, &(0x7f0000001280)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001440)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) clock_gettime(0x0, &(0x7f00000051c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 412.698438] kasan: CONFIG_KASAN_INLINE enabled [ 412.703467] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 412.711151] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 412.717399] CPU: 1 PID: 12437 Comm: syz-executor0 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 412.725885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.735251] RIP: 0010:mqueue_get_tree+0xdd/0x2e0 [ 412.740023] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6d 08 49 8d 7d 68 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b6 01 00 00 4d 8b 6d 68 4d 85 ed 74 11 e8 1b 44 [ 412.758930] RSP: 0018:ffff880157fdf928 EFLAGS: 00010a02 [ 412.764309] RAX: dffffc0000000000 RBX: ffff8801d221dcc0 RCX: ffffc90001e60000 [ 412.771591] RDX: 1bd5a9d5a000000d RSI: ffffffff833deb15 RDI: dead4ead00000068 [ 412.778874] RBP: ffff880157fdf948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 412.786138] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801c02a8c00 [ 412.793399] R13: dead4ead00000000 R14: ffff8801d221dd58 R15: ffff8801d221dd58 [ 412.800670] FS: 00007f6427850700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 412.808904] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.814777] CR2: 00007fee7998c030 CR3: 00000001cd277000 CR4: 00000000001406e0 [ 412.822042] Call Trace: [ 412.824642] vfs_get_tree+0x1cb/0x5c0 [ 412.828448] mq_create_mount+0xe3/0x190 [ 412.832420] mq_init_ns+0x15a/0x210 [ 412.836044] copy_ipcs+0x3d2/0x580 [ 412.839591] ? ipcns_get+0xe0/0xe0 [ 412.843155] ? do_mount+0x1db0/0x1db0 [ 412.846964] ? kmem_cache_alloc+0x33a/0x730 [ 412.851284] ? copy_fs_struct+0x240/0x2d0 [ 412.855436] create_new_namespaces+0x376/0x900 [ 412.860021] ? sys_ni_syscall+0x20/0x20 [ 412.863998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.869535] ? ns_capable_common+0x13f/0x170 [ 412.873946] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 412.878880] ksys_unshare+0x79c/0x10b0 [ 412.882779] ? kcov_ioctl+0x56/0x1f0 [ 412.886494] ? walk_process_tree+0x440/0x440 [ 412.890919] ? __fget_light+0x2e9/0x430 [ 412.894915] ? fget_raw+0x20/0x20 [ 412.898395] ? graph_lock+0x170/0x170 [ 412.902218] ? finish_task_switch+0x1f5/0x900 [ 412.906797] ? _raw_spin_unlock_irq+0x27/0x80 [ 412.911301] ? do_syscall_64+0x9a/0x820 [ 412.915274] ? do_syscall_64+0x9a/0x820 [ 412.919247] ? lockdep_hardirqs_on+0x421/0x5c0 [ 412.924004] ? trace_hardirqs_on+0xbd/0x310 [ 412.928355] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 412.933902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.939284] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 412.944742] ? ksys_ioctl+0x81/0xd0 [ 412.948385] __x64_sys_unshare+0x31/0x40 [ 412.952447] do_syscall_64+0x1b9/0x820 [ 412.956332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.961700] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.966644] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.971662] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 412.976684] ? recalc_sigpending_tsk+0x180/0x180 [ 412.981440] ? kasan_check_write+0x14/0x20 [ 412.985681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.990545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.995741] RIP: 0033:0x4572d9 [ 412.998966] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.017873] RSP: 002b:00007f642784fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 413.025583] RAX: ffffffffffffffda RBX: 00007f64278506d4 RCX: 00000000004572d9 [ 413.032893] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020000 [ 413.040160] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 413.047450] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 413.054722] R13: 00000000004d7c40 R14: 00000000004caa82 R15: 0000000000000000 [ 413.061999] Modules linked in: [ 413.065275] ---[ end trace 1833acc117ae45bf ]--- [ 413.070068] RIP: 0010:mqueue_get_tree+0xdd/0x2e0 [ 413.074869] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6d 08 49 8d 7d 68 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b6 01 00 00 4d 8b 6d 68 4d 85 ed 74 11 e8 1b 44 [ 413.093878] RSP: 0018:ffff880157fdf928 EFLAGS: 00010a02 03:33:47 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x208800) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x98) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(0xffffffffffffffff, &(0x7f0000000280)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getuid() [ 413.099270] RAX: dffffc0000000000 RBX: ffff8801d221dcc0 RCX: ffffc90001e60000 [ 413.106617] RDX: 1bd5a9d5a000000d RSI: ffffffff833deb15 RDI: dead4ead00000068 [ 413.113933] RBP: ffff880157fdf948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 413.121250] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801c02a8c00 [ 413.128533] R13: dead4ead00000000 R14: ffff8801d221dd58 R15: ffff8801d221dd58 [ 413.135121] kobject: 'loop2' (00000000432f270d): kobject_uevent_env [ 413.135874] FS: 00007f6427850700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 413.149081] kobject: 'loop2' (00000000432f270d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 413.150518] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.150532] CR2: 00007fee7998c030 CR3: 00000001cd277000 CR4: 00000000001406e0 [ 413.173227] Kernel panic - not syncing: Fatal exception [ 413.179626] Kernel Offset: disabled [ 413.183256] Rebooting in 86400 seconds..