203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)) migrate_pages(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000140)=0x4) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) mount$9p_rdma(&(0x7f0000000400)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000580)={'trans=rdma,', {'port'}}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) [ 399.111795] audit: type=1326 audit(2000000091.509:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11515 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:51 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/142, 0x8e) 03:34:51 executing program 2: prctl$seccomp(0x25, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:51 executing program 1: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f00000006c0), 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='rxrpc_s\x00', &(0x7f0000000580), &(0x7f00000007c0), 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:51 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) [ 399.680485] audit: type=1326 audit(2000000092.069:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11532 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0xa, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000000)=0x2c2) 03:34:52 executing program 5: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@l2, &(0x7f00000008c0)=0x80, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 399.881107] audit: type=1326 audit(2000000092.269:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11515 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x3}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:34:52 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x1a6, 0x185) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 03:34:52 executing program 2: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:52 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x1a6, 0x185) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) [ 400.472230] audit: type=1326 audit(2000000092.859:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11532 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:52 executing program 1: getpid() getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000180)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000180)={[], 0x0, 0x400, 0x4, 0x9}) 03:34:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="abaeaaaaaaaaaa060caaaa00080045"], &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:34:53 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x1a6, 0x185) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 03:34:53 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff94}, {0xffffffffffffffff}}) 03:34:53 executing program 5: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@l2, &(0x7f00000008c0)=0x80, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b99, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f43f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d854fa750a48a513c42d480ccd3a94e399c22c04a592199c8745a97005652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000003c0)=@buf={0x36, &(0x7f0000000340)="cc031b9a565360f19e3d5eeed1a98e6efeeb741bcd3a443a341df75d3a9c45122f1cc2818bf259f31786d7b7dcbb76ad9800a5d98168"}) [ 400.936406] kvm: emulating exchange as write 03:34:53 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x1a6, 0x185) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 03:34:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="abaeaaaaaaaaaa060caaaa00080045"], &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:34:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b99, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f43f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d854fa750a48a513c42d480ccd3a94e399c22c04a592199c8745a97005652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000003c0)=@buf={0x36, &(0x7f0000000340)="cc031b9a565360f19e3d5eeed1a98e6efeeb741bcd3a443a341df75d3a9c45122f1cc2818bf259f31786d7b7dcbb76ad9800a5d98168"}) 03:34:54 executing program 2: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getegid() getpid() fstat(0xffffffffffffffff, &(0x7f0000001940)) getgroups(0x0, &(0x7f00000019c0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00), &(0x7f0000001a40)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000002200), &(0x7f0000002240), &(0x7f0000002280)) fstat(0xffffffffffffffff, &(0x7f00000022c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002900)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000002a00)=0xe8) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="abaeaaaaaaaaaa060caaaa00080045"], &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:34:54 executing program 0: open(&(0x7f0000000800)='./file0\x00', 0x40, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) geteuid() setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000380), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000800)) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in, @in6=@ipv4}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001140)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001280)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:54 executing program 1: prctl$setmm(0x23, 0x7, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @loopback}, &(0x7f0000000300)=0xc) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@dev}, 0x14) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) readahead(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000001c0)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380), 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[]}}, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b99, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f43f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d854fa750a48a513c42d480ccd3a94e399c22c04a592199c8745a97005652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000003c0)=@buf={0x36, &(0x7f0000000340)="cc031b9a565360f19e3d5eeed1a98e6efeeb741bcd3a443a341df75d3a9c45122f1cc2818bf259f31786d7b7dcbb76ad9800a5d98168"}) 03:34:54 executing program 5: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@l2, &(0x7f00000008c0)=0x80, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="abaeaaaaaaaaaa060caaaa00080045"], &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b99, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f43f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d854fa750a48a513c42d480ccd3a94e399c22c04a592199c8745a97005652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000003c0)=@buf={0x36, &(0x7f0000000340)="cc031b9a565360f19e3d5eeed1a98e6efeeb741bcd3a443a341df75d3a9c45122f1cc2818bf259f31786d7b7dcbb76ad9800a5d98168"}) 03:34:54 executing program 3: prctl$setname(0x24, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:55 executing program 4: clock_gettime(0x1, &(0x7f0000000c00)) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsa(&(0x7f0000000ac0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000b40)=""/182) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:55 executing program 5: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@l2, &(0x7f00000008c0)=0x80, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:55 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) dup(0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000005540), &(0x7f0000005580)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000280), 0xc, &(0x7f0000005600)={&(0x7f00000055c0)=@getstats={0x1c}, 0x1c}}, 0x0) times(&(0x7f00000002c0)) add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:55 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001780)=""/20, 0x14}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001800)='/dev/sequencer2\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005440), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000055c0)={0xffffffffffffff9c}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000005600)='net/ip6_mr_vif\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000005640)='/dev/zero\x00', 0x0, 0x0) pipe2(&(0x7f0000005680), 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f0000000280), 0xc, &(0x7f0000005740)={&(0x7f00000056c0)={0x14}, 0x14}}, 0x0) 03:34:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x800004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000), &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x20040055) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000e40)={&(0x7f0000000240), 0xc, &(0x7f0000000e00)={&(0x7f0000001080)={0x14}, 0x14}}, 0x0) [ 403.167480] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:34:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7afb0295df0df8217ad40000002000000", 0x20) 03:34:55 executing program 3: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000cc0)) 03:34:55 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000340)={{0x0, @loopback, 0x4e23, 0x3, 'sh\x00', 0x8}, {@dev, 0x4e22, 0x0, 0x0, 0x8}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) [ 403.605623] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 03:34:56 executing program 4: r0 = msgget(0xffffffffffffffff, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x8004000000000000, 0x0) 03:34:56 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000340)={{0x0, @loopback, 0x4e23, 0x3, 'sh\x00', 0x8}, {@dev, 0x4e22, 0x0, 0x0, 0x8}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) 03:34:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f00000009c0)}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fdatasync(0xffffffffffffffff) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:56 executing program 5: creat(&(0x7f0000000240)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000880), 0x8) fstat(0xffffffffffffffff, &(0x7f0000000980)) geteuid() setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000380), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000800)) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in, @in6=@ipv4}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001140)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001280)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 403.932762] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 03:34:56 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000340)={{0x0, @loopback, 0x4e23, 0x3, 'sh\x00', 0x8}, {@dev, 0x4e22, 0x0, 0x0, 0x8}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) 03:34:56 executing program 2: add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f000046bae7), &(0x7f0000000340)="10821097", 0x4, 0xffffffffffffffff) [ 404.136715] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks [ 404.161958] kvm [11698]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x187 data 0x4000 [ 404.176611] kvm [11698]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x186 data 0x4000 03:34:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1) 03:34:56 executing program 2: rt_sigpending(&(0x7f0000000140), 0x8) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000b40)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000002100)) prctl$setname(0xf, &(0x7f0000001840)='\x00') ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000001940)={'tunl0\x00', {0x2, 0x0, @multicast1}}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) vmsplice(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000001800)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) mlock2(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000001880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001d40), 0x0, &(0x7f0000001dc0)=""/181, 0xb5}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:56 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000340)={{0x0, @loopback, 0x4e23, 0x3, 'sh\x00', 0x8}, {@dev, 0x4e22, 0x0, 0x0, 0x8}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) [ 404.340073] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 03:34:56 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1) 03:34:56 executing program 3: clock_gettime(0xb, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) 03:34:57 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1) 03:34:57 executing program 5: sysfs$2(0x3, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f0000000080)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000), 0x10) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f00000009c0)}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fdatasync(0xffffffffffffffff) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:57 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1) 03:34:57 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000002c0)) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000001b80)=""/221) syz_execute_func(&(0x7f0000001b40)="428055a0296969ef69dc00d99069203637c3397c2a0f97cdae300f38211a40a564a741dfe0400f01efe5e57d0fec01ecec1a01460fd6994e4ea3b77b86e29898") [ 405.228169] kvm [11751]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x187 data 0x4000 [ 405.245967] kvm [11751]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x186 data 0x4000 03:34:57 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:58 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f0000000040)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb90061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r2, &(0x7f0000000140)='\x00', 0x1) write$binfmt_aout(r2, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x1fb}}, 0x20) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000000)={&(0x7f0000002100)=""/4096, 0x1000}) 03:34:58 executing program 3: prctl$setname(0x2f, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) sendto$unix(r1, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) ioctl$sock_bt(r1, 0x8907, &(0x7f0000000180)) recvfrom$inet(r1, &(0x7f0000000080)=""/181, 0xb5, 0x0, &(0x7f0000000140)={0x2, 0x0, @rand_addr}, 0x70d000) 03:34:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_rxfh={0x0, 0x7ff, 0x0, 0x0, 0x0, "02e49b"}}) 03:34:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0xfffffffffffffffd, 0x101}) write(r2, &(0x7f0000000300)="7b98", 0x2) [ 405.876474] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! 03:34:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f00000009c0)}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fdatasync(0xffffffffffffffff) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f0000000100), 0x2a2, 0x10400003) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000340)={0x0, 0x0, 0x8000}, 0x4) getsockname(r0, &(0x7f0000000700)=@ax25, &(0x7f0000000680)=0x80) write$cgroup_int(r2, &(0x7f0000000780), 0x12) 03:34:58 executing program 1: r0 = socket(0x2000000000010, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000240)=@generic={0x3}) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f0000000100), 0x2a2, 0x10400003) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000340)={0x0, 0x0, 0x8000}, 0x4) getsockname(r0, &(0x7f0000000700)=@ax25, &(0x7f0000000680)=0x80) write$cgroup_int(r2, &(0x7f0000000780), 0x12) [ 406.195389] kvm [11803]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x187 data 0x4000 03:34:58 executing program 1: memfd_create(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe6}]}) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000000280), 0x8) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000002c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000180)) getpgid(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000cc0)) getgroups(0x0, &(0x7f00000004c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000012c0)) geteuid() lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)) getpid() stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000018c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000019c0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001ac0)=0xe8) getgid() gettid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001bc0)={&(0x7f0000001b80)='/dev/full\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001c00)='./file1\x00', &(0x7f0000001c40)) getgroups(0x0, &(0x7f0000001cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e00), 0x0, 0x0) pipe2(&(0x7f0000001f00), 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_init() socket$inet(0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000940)=ANY=[], &(0x7f0000000480)) keyctl$setperm(0x5, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) [ 406.241713] kvm [11803]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x186 data 0x4000 03:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f0000000100), 0x2a2, 0x10400003) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000340)={0x0, 0x0, 0x8000}, 0x4) getsockname(r0, &(0x7f0000000700)=@ax25, &(0x7f0000000680)=0x80) write$cgroup_int(r2, &(0x7f0000000780), 0x12) 03:34:58 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f0000000100), 0x2a2, 0x10400003) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000340)={0x0, 0x0, 0x8000}, 0x4) getsockname(r0, &(0x7f0000000700)=@ax25, &(0x7f0000000680)=0x80) write$cgroup_int(r2, &(0x7f0000000780), 0x12) 03:34:59 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x29d1ac30) utime(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:34:59 executing program 5: clock_gettime(0x2, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:34:59 executing program 2: keyctl$dh_compute(0x1d, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f00000009c0)}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fdatasync(0xffffffffffffffff) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 407.149081] kvm [11846]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x187 data 0x4000 [ 407.177395] kvm [11846]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x186 data 0x4000 03:34:59 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:59 executing program 1: unshare(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000280)=""/243) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:00 executing program 5: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x13f) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000006c0)='dctcp-reno\x00', 0xb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) getpgid(0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) stat(&(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000640)) lchown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) timer_create(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, @thr={&(0x7f0000000580), &(0x7f0000000bc0)}}, &(0x7f0000000cc0)) timer_delete(0x0) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000002c0), 0xc, &(0x7f0000000900)={&(0x7f0000000b00)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000780)=""/194, 0xc2, 0x0, &(0x7f0000000880)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[]}}, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioprio_set$pid(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000940)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") add_key$user(&(0x7f0000000340)='user\x00', &(0x7f00000005c0), &(0x7f0000000600), 0x0, 0x0) add_key(&(0x7f0000000a00)='cifs.spnego\x00', &(0x7f0000000a40), &(0x7f0000000a80), 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, 0x0) lchown(&(0x7f00000009c0)='./file0/file0\x00', 0x0, 0x0) 03:35:00 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x29d1ac30) utime(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:35:00 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) geteuid() getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003d00)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getgroups(0x0, &(0x7f0000003ec0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000004040), &(0x7f0000004080), &(0x7f00000040c0)) stat(&(0x7f0000004100)='./file0\x00', &(0x7f0000004140)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000041c0)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000042c0)=0xe8) getgroups(0x0, &(0x7f0000004300)) 03:35:00 executing program 4: shmget$private(0x7, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x0, 0x0) getpgid(0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) accept4(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002440)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002540)=0xe8) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002640)='/dev/loop-control\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000002680)) fcntl$getown(0xffffffffffffff9c, 0x9) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002700), 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002740)) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002b40)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002c40)=0xe8) getgroups(0x0, &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002d00)={&(0x7f0000000640)=@proc, 0xc, &(0x7f0000002b00), 0x0, &(0x7f0000002cc0)}, 0x0) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) shmdt(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:35:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmod(r0, 0x0) 03:35:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x100000a, 0x32, 0xffffffffffffffff, 0x0) ioctl(r1, 0x40084149, &(0x7f0000001f64)) 03:35:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) 03:35:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000001b80)) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000001bc0), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001c00)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001c40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d40)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001e40)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e80)) getresuid(&(0x7f0000001ec0), &(0x7f0000001f00), &(0x7f0000001f40)) fstat(0xffffffffffffff9c, &(0x7f0000001f80)) socket(0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002080)={&(0x7f0000000700)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000001b00), 0x0, &(0x7f0000002000)}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) lstat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)) fstatfs(0xffffffffffffffff, &(0x7f0000000480)=""/162) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) statx(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200), 0x88) syz_execute_func(&(0x7f0000000640)="42805da07b0fef69dc0f01eece73fe19fa380f3821c481b5e5bc2b000000218f497c80cc6b54e67979c4a1715e0e4136d9eb940f2e1a1ac2a5a6550e44dbe271fb870336") syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000400)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x2) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "34770322b9cd806552e1ea4829b29928818e12fab05cc54fc0e17f965c0981309d9580fde4bb3cf9753b96cc614e331d8f4feb57206ace71fc029c615c051f9d6b5a3af69a4b1811f5885471f1a1bb8e"}, 0xd8) 03:35:00 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0), 0x302, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000100)=0x5, 0x15f) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x4b}, 0x40002102) 03:35:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0), 0x302, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000100)=0x5, 0x15f) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x4b}, 0x40002102) 03:35:01 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x29d1ac30) utime(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:35:01 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffd) futex(&(0x7f0000000040), 0x0, 0xfffffffffffffffe, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000380), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000440), 0xc) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0), 0x302, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000100)=0x5, 0x15f) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x4b}, 0x40002102) 03:35:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0), 0x302, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000100)=0x5, 0x15f) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x4b}, 0x40002102) 03:35:01 executing program 2: gettid() ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/243, 0xf3}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:01 executing program 4: clock_gettime(0x8000000b, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) getgroups(0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getegid() getpgid(0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={r2, 0x2, 0x6, @local}, 0x10) 03:35:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x100000000000031, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) getsockopt(r1, 0x200000000114, 0x2710, &(0x7f0000000140)=""/1, &(0x7f0000000180)=0x94b5964f846fa3d2) 03:35:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000002480)={0x1, 0x5, 0x100020000000007, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f00000010c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000ab2000), &(0x7f0000da1000)}, 0x20) getpid() io_setup(0x0, &(0x7f0000000040)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:01 executing program 0: stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)) personality(0x0) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000340)) futex(&(0x7f0000000c40), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000c00), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getuid() ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b80)={&(0x7f0000000980)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:01 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x29d1ac30) utime(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:35:02 executing program 5: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)="256472b0eeb708339cf725b9b2c4bc20e22389fa72246e8f9706f877ffa1c85cd913303af9eeaece2cddeee3b37f47") 03:35:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x40000}) 03:35:02 executing program 2: dup(0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000500)={0x8c, 0x7d, 0x0, {{0x0, 0x65, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x12, '/dev/snd/pcmC#D#p\x00', 0x12, '/dev/snd/pcmC#D#p\x00', 0xe, '(vboxnet1bdev#'}, 0x12, '/dev/snd/pcmC#D#p\x00'}}, 0x8c) membarrier(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:35:02 executing program 5: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000040)=0x80) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffa) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)=""/167, &(0x7f0000000380)=0xa7) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) getuid() getgroups(0x0, &(0x7f00000007c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in, @in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockname$unix(0xffffffffffffffff, &(0x7f0000000d00)=@abs, &(0x7f0000000d80)=0x6e) getuid() lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast2, @in=@local}}, {{@in6=@loopback}}}, &(0x7f0000000c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:35:02 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000ec0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000200)) get_robust_list(0x0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f00000003c0)=0x18) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1ffffffffffffedd, &(0x7f0000000280)}) 03:35:02 executing program 4: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) set_tid_address(&(0x7f0000000180)) 03:35:02 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'gre0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'vcan0\x00', @ifru_mtu}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0x0, &(0x7f00000007c0)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) 03:35:02 executing program 3: add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f00000006c0)='o', 0x1, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='rxrpc_s\x00', &(0x7f0000000580), &(0x7f00000007c0), 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000004f}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x80ffff, 0x201a7fd7, 0xa, 0xa, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xffe3, &(0x7f00001a7f05)=""/251}, 0x48) 03:35:03 executing program 5: socketpair$unix(0x1, 0x400000000000003, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000640)) mount$9p_unix(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=unix,'}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xffffff79) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000000340)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) getuid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) 03:35:03 executing program 2: socket$inet(0x2, 0xa, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000180), 0x8, 0x0) pipe(&(0x7f0000000640)) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:03 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:35:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') ioctl$VT_RELDISP(r1, 0xb701) 03:35:03 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'gre0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'vcan0\x00', @ifru_mtu}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0x0, &(0x7f00000007c0)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) 03:35:03 executing program 0: ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000180)=0x80) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000300)) creat(&(0x7f00000000c0)='./file0\x00', 0x6102bc20ebf407b4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000140)={0x1a, 0x30f, 0x400, 0x80, 0x0, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) accept4$llc(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) 03:35:03 executing program 3: clock_gettime(0x2, &(0x7f00000005c0)) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@loopback}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@local, @local}, &(0x7f0000000b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000003340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003380)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@local}, &(0x7f0000003400)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003780)={0xfffffffffffffffe, 0x0, &(0x7f0000003740)={&(0x7f0000003440)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) gettid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000001100)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000380)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=""/248, 0xf8}) pipe2(&(0x7f0000000400), 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000980)='cgroup.type\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet_udp(0x2, 0x2, 0x0) 03:35:04 executing program 0: ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000180)=0x80) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000300)) creat(&(0x7f00000000c0)='./file0\x00', 0x6102bc20ebf407b4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000140)={0x1a, 0x30f, 0x400, 0x80, 0x0, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) accept4$llc(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) 03:35:04 executing program 2: socket$inet(0x2, 0xa, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000180), 0x8, 0x0) pipe(&(0x7f0000000640)) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:04 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:35:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) 03:35:04 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'gre0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'vcan0\x00', @ifru_mtu}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0x0, &(0x7f00000007c0)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) 03:35:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f0000000080)='GPL\x00', 0xe2, 0xfb, &(0x7f0000000300)=""/251}, 0x48) 03:35:04 executing program 5: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @local}, &(0x7f00000005c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @rand_addr, @multicast2}, &(0x7f0000001180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast1}, &(0x7f0000001200)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:04 executing program 4: request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) creat(&(0x7f00000004c0)='./file0\x00', 0x0) dup(0xffffffffffffffff) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000380)) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000003c0)=""/70) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f0000000580)=""/198) syz_execute_func(&(0x7f0000000500)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000440)=@filter={'filter\x00', 0xe, 0x2, 0x90, [0x0, 0x200008c0, 0x20000a20, 0x20000a50], 0x0, &(0x7f00000001c0), &(0x7f00000008c0)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 03:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:04 executing program 0: ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000180)=0x80) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000300)) creat(&(0x7f00000000c0)='./file0\x00', 0x6102bc20ebf407b4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000140)={0x1a, 0x30f, 0x400, 0x80, 0x0, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) accept4$llc(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) 03:35:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:05 executing program 2: socket$inet(0x2, 0xa, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000180), 0x8, 0x0) pipe(&(0x7f0000000640)) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:05 executing program 0: ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000180)=0x80) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000300)) creat(&(0x7f00000000c0)='./file0\x00', 0x6102bc20ebf407b4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000140)={0x1a, 0x30f, 0x400, 0x80, 0x0, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) accept4$llc(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) 03:35:05 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'gre0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'vcan0\x00', @ifru_mtu}) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0x0, &(0x7f00000007c0)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) 03:35:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000, 0x9effffff00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0xf}]}, 0x20}}, 0x0) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0]) process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001900)=[{&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001780)=""/180, 0xb4}], 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) 03:35:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'sit0\x00', {0x2, 0x0, @multicast2}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[], 0x0) 03:35:06 executing program 2: socket$inet(0x2, 0xa, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000180), 0x8, 0x0) pipe(&(0x7f0000000640)) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:06 executing program 5: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f00000004c0)="440f20c066350d000000440f22c0660f22010f238d0f9da50e0066b9f90800000f32660fae70090f30b807008ee03e660f01c82e360f380325", 0x39}], 0x1a7, 0x30, &(0x7f0000000400), 0x85) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:06 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0xfffffffffffffdb7, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) geteuid() getresuid(&(0x7f0000000380), &(0x7f0000002880), &(0x7f00000028c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:06 executing program 4: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) truncate(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0xfe, &(0x7f0000000600)=""/254}, 0x48) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='\x00', 0xffffffffffffffff) request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000000c0), &(0x7f0000000280)="19", 0x1, r2) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r3, r4, r4}, &(0x7f0000000140)=""/5, 0x5, &(0x7f0000000180)={&(0x7f00000002c0)={'sha384\x00'}}) 03:35:06 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0xfffffffffffffdb7, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) geteuid() getresuid(&(0x7f0000000380), &(0x7f0000002880), &(0x7f00000028c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:06 executing program 0: keyctl$dh_compute(0xa, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:06 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) syz_execute_func(&(0x7f0000000680)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:35:06 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0xfffffffffffffdb7, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) geteuid() getresuid(&(0x7f0000000380), &(0x7f0000002880), &(0x7f00000028c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:06 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xfffffffe) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000800)=""/254) syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000400), &(0x7f0000000500)=0x30) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) recvmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x0, 0x0, &(0x7f0000004380)) syz_open_dev$admmidi(&(0x7f0000003500)='/dev/admmidi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000043c0)={0x0, &(0x7f0000004440)}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz1\x00', 0x1ff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000700)={'filter\x00'}, &(0x7f0000000780)=0x44) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdd) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000480)) syz_genetlink_get_family_id$fou(&(0x7f00000005c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000900)={'lo\x00', {0x2, 0x0, @loopback}}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) getegid() userfaultfd(0x0) syz_execute_func(&(0x7f0000000380)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:35:07 executing program 3: keyctl$set_reqkey_keyring(0x17, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0xfffffffffffffdb7, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) geteuid() getresuid(&(0x7f0000000380), &(0x7f0000002880), &(0x7f00000028c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:07 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) 03:35:07 executing program 5: socket$inet(0x2, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00'}, 0x118) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000600), 0x4) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000580)) open(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="42805da0510fef69dc0f01ee0dce41cbff4848dddda33d062900770f7899c731233d09121112116eeefa39f6eefa39f60f38d3ba2727a10dfbd6df0fc11ac4010d64ac1e5d31a3b7e2989f") 03:35:07 executing program 3: socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x541b, &(0x7f0000000000)) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:07 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:07 executing program 0: getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) pipe2(&(0x7f0000000140), 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @remote}, &(0x7f0000000d00)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001080)={@multicast2, @dev}, &(0x7f00000010c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000011c0)={'vcan0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e40), 0x0, 0x0, &(0x7f0000004040)) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000040)) [ 415.232013] proc: Unknown parameter '' 03:35:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)=ANY=[@ANYBLOB="230302"]) 03:35:08 executing program 3: fanotify_init(0x0, 0x0) prctl$setname(0x2f, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000140), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) [ 416.090007] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 03:35:08 executing program 0: clone(0xfffffff4, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:08 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x20000188) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="6f728d8b144bb05a0a39fbdfcf4db63d3bc30ae2edddd4e21bc9705bb9cae3f09d4c73b6ca54152863aa3d3c49ea296fe493ccb1b775a6782d09bd93775f11ce7dab3665e81414bbb229887682bb7b15e544d991c87b9ecdeed23e15cf421d5796d82822baa07581c0adceb2ae6e98923a2848682bf370183fe2d31ea66778844024ee9ed06e2d0253f5e5c11be36b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x5f5) getdents(r0, &(0x7f0000000140)=""/2, 0x450) getdents64(r0, &(0x7f00000001c0)=""/57, 0xffffffffffffff04) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'\x00', @ifru_hwaddr=@dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_pts(0xffffffffffffff9c, 0x800) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 03:35:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b10b938630270b", 0x7}], 0x1, &(0x7f0000000200)}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)="d05b0563", 0x4}], 0x1, &(0x7f0000001780)}, 0x0) 03:35:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:09 executing program 3: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000180)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f00000000c0)="43a2bc507b99", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080)}) 03:35:09 executing program 4: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) fstat(0xffffffffffffffff, &(0x7f0000000400)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005940)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) geteuid() getresuid(&(0x7f0000000600), &(0x7f0000000dc0), &(0x7f0000000e00)) getuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e40)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000084c0), &(0x7f0000008500)=0xc) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008580)={&(0x7f0000000200), 0xc, &(0x7f0000008400), 0x0, &(0x7f0000008540)}, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000240)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 03:35:09 executing program 1: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) [ 417.695692] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(124713464278946) <= P.seqno(0) <= S.SWH(124713464279020)) and (P.ackno exists or LAWL(165415965252552) <= P.ackno(165415965252553) <= S.AWH(165415965252553), sending SYNC... [ 417.810652] dccp_close: ABORT with 1061 bytes unread 03:35:10 executing program 1: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) [ 418.099380] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(227422094331264) <= P.seqno(0) <= S.SWH(227422094331338)) and (P.ackno exists or LAWL(101942932286106) <= P.ackno(101942932286107) <= S.AWH(101942932286107), sending SYNC... [ 418.177947] dccp_close: ABORT with 1061 bytes unread 03:35:10 executing program 1: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) 03:35:10 executing program 4: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) [ 418.433008] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(268311947396283) <= P.seqno(0) <= S.SWH(268311947396357)) and (P.ackno exists or LAWL(55423001438804) <= P.ackno(55423001438805) <= S.AWH(55423001438805), sending SYNC... 03:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000000), &(0x7f0000000240)=""/202}, 0x18) 03:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000001c0)=""/44) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000140)) setns(0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000200)}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000300)) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0xfffffd1e) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000580), &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000600), 0x8) syz_execute_func(&(0x7f0000000380)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b7c4a1fd702d001000005ee2989f7f") ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$intptr(0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz1\x00', 0x1ff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) 03:35:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) [ 418.580327] dccp_close: ABORT with 1061 bytes unread 03:35:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 418.672006] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(268794652023521) <= P.seqno(0) <= S.SWH(268794652023595)) and (P.ackno exists or LAWL(196546787493322) <= P.ackno(196546787493323) <= S.AWH(196546787493323), sending SYNC... 03:35:11 executing program 1: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) 03:35:11 executing program 4: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) [ 418.732272] dccp_close: ABORT with 1061 bytes unread [ 418.998445] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(218798314525916) <= P.seqno(0) <= S.SWH(218798314525990)) and (P.ackno exists or LAWL(182434214621268) <= P.ackno(182434214621269) <= S.AWH(182434214621269), sending SYNC... [ 419.049917] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(277178361497492) <= P.seqno(0) <= S.SWH(277178361497566)) and (P.ackno exists or LAWL(245813820887076) <= P.ackno(245813820887077) <= S.AWH(245813820887077), sending SYNC... 03:35:11 executing program 1: mremap(&(0x7f0000a94000/0x1000)=nil, 0x7ffffffff000, 0x7ffffffff000, 0x0, &(0x7f0000b18000/0xe000)=nil) 03:35:11 executing program 1: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = semget$private(0x0, 0x20000000102, 0x0) semop(r1, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x1) semop(r1, &(0x7f0000000080)=[{0x1}, {0x0, 0xffffffff}], 0x2) semop(r1, &(0x7f0000000000)=[{0x0, 0x7}], 0x1) 03:35:11 executing program 4: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(r3, &(0x7f0000000f80)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) 03:35:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) 03:35:12 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x40000000000e900, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="eb2c90", 0x3}], 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 419.778158] FAT-fs (loop0): bogus number of reserved sectors [ 419.809865] FAT-fs (loop0): This looks like a DOS 1.x volume, but isn't a recognized floppy size (264192 sectors) [ 419.810003] cpuset: Unknown parameter 'cpuset' [ 419.825726] FAT-fs (loop0): Can't find a valid FAT filesystem [ 420.227274] cpuset: Unknown parameter 'cpuset' 03:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2000000000000f, &(0x7f0000000040)=0x50b, 0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:35:12 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000300)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='net/udplite\x00') ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000780)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@multicast2, @dev}, &(0x7f0000000840)=0xc) accept(0xffffffffffffffff, &(0x7f0000000880)=@can, &(0x7f0000000900)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'bond0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@multicast1, @rand_addr}, &(0x7f0000000b00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000e00)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000e40)=@ll, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001040)=""/39, 0x27}, 0x0) 03:35:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:35:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000080)={0x4, r2}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x4, r2}) 03:35:12 executing program 1: statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/28) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:12 executing program 3: keyctl$setperm(0x8, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) 03:35:12 executing program 4: keyctl$set_reqkey_keyring(0x14, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x7530}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000540)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee400fe43f9fc4227992749f55") 03:35:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:13 executing program 0: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000056c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000005700)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005000), &(0x7f0000005040)=0xc) stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpgrp(0xffffffffffffffff) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005140)) fstat(0xffffffffffffffff, &(0x7f0000005180)) add_key(&(0x7f0000005480)='pkcs7_test\x00', &(0x7f00000054c0), &(0x7f0000005500), 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, 0x0, &(0x7f00000055c0)=""/248, 0xf8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005780), &(0x7f00000057c0)=0xc) getresgid(&(0x7f0000005240), &(0x7f0000005280), &(0x7f00000052c0)) 03:35:13 executing program 3: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 03:35:13 executing program 1: inotify_init() openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000001440)=ANY=[], &(0x7f0000000440)=""/4096, 0x1000) epoll_create(0x0) open$dir(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000400), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a40)={"6c3000000000f962f200"}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000001a80)={"097ea0fa9c057e8bb5a7143c45a68c39e1e433384bd1944f24eca316d5ba68298790e1cfb3ddb56221f016fc47fc50d697889dbbbe5fee6ee08e5c435ba4ef0e860a80e9e6df47af295be909a1a0a7e88df1ecdde8de47f1afa4a95fe19dab9dc793c91c17cb89dd752a10d3a75bec19cf8c30bae3a0f36f4bfba443ddcafd6f0c65dc86c003d7380882f6a4669021f6604d29d81a8b2a8e9b83843e3e8a83fb37c22c5c9562ca52648d54174440a93c182e9b9fddaf53cfb93f581b77f1613fd2d972b7b478619735c2a4ba44015a5a25cb3539a59a1e8cceeb899added31af7f46e3c2e6ca728bfc4ab44870d711241e106e9d300527ea76861d6e444bafeb5ba951321ecb385b5114da5dbb07d81464fbefd0ba93fd297d2fb8ade0d729c653e160aa1552205c459b23ecf61d54e736fe6769e7d7312682ec77fc2efe79c5037a41321bc38203ecfea5a4c78d64004371308b3640ee69084e6932e28b9aa2e85e29bf9d74010088655b16acd3178c9b156d953b64a1459bfcb10f369c973d117ae73bf657d554c4d71e556228cdc5662f4da8eb530f1fa77dbb3dc464d5c6af4e0e9694ec1b90b419304a4c2a08dd174aefc6258c47fa1c0dac7a8d203ae625ec94751a9e51497925c89cd55423afadc36c50176c58ffd37a7f85fa38b78e0459d51e8c753f5358e5a1876d91b49c3cb565cc0ec5c72bd7960c5f8529165977c16408c0aa3571d5a7151078659ecd3af3e69fed142bd743888d2575649d379e2a0cad9d4b1a39318b0b35e92079af26e35e521ff220b87f7311ed3da58e7e210b34b97e6f65f3141d7663c6d1b323d2a8545ff33306983cc69bf98607b26e7fe36bcd91b5cca3101d8aaed96ec47b871b97749131c425ed2b7b30d115fd9e1d7de42172f0c6c336b1f8f90b86732ec5af35a59be4c6b6e2201b79f9513653cfe61833883202387a91865dde6c4d63b79c2cf674dbdecb355e7812e8f8c7d070e1670791ae6abd242de053d5793a097356a678160e0e9d451e69a567d3c430148a4a2d54efa46182c91fe5151b2e17dc2d32f0a9b703dbd7dd24e011f08deb5e6912fa2ed8172bb92cad50a02f652e87136042b7147aeeb02ec28d01daa570a6adab9a184fab6099e742d126cfbfc302d463b147bcd7e924bb25e9231acff8f509a6441c927e1d0334bb82c44ec9ac8e90a964bfa659db7a318bbaaf76bc0fcd24da732b2c8e58ac162456005e1c17696fb325618edf49d3c9ca6b860235185de7c6adc6b28d09c11018714e26fc339c84e7cbf8a31749afadae26f7854c76a806e151681de7b2b488c4e2075e5279c4ff724f74769c0b87e4c369e8780e35c2e05cc96b76dc6630907525e6ff8563e5de76a26b32f405bad63c17f06cb64c835a919dcfec62d2756473ccce34982a5f61323580630e4cde3d07e34aebe1de"}) rmdir(&(0x7f0000000240)='./file0/file0\x00') ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f00000019c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffff9c, &(0x7f0000000300)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@loopback, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0x25) fstat(0xffffffffffffffff, &(0x7f0000000900)) getegid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpu.stat\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000a40), 0x0) getegid() getgid() lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000b40)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 03:35:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:14 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001780)=""/20, 0x14}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001800)='/dev/sequencer2\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005440), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000055c0)={0xffffffffffffff9c}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000005600)='net/ip6_mr_vif\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000005640)='/dev/zero\x00', 0x0, 0x0) 03:35:14 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) 03:35:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:15 executing program 2: clock_gettime(0x100000007, &(0x7f0000000180)) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000640), &(0x7f00000019c0), &(0x7f0000001a00)) getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) getpgid(0x0) getuid() fstat(0xffffffffffffffff, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in=@broadcast, @in=@broadcast}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002700), &(0x7f0000002740)=0xc) getgroups(0x0, &(0x7f0000002780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000027c0)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003b80)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004100)) getuid() getgroups(0x0, &(0x7f0000003cc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003d00)) getuid() lstat(&(0x7f0000003d40)='./file0\x00', &(0x7f0000003d80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004000)) stat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000002b00)=0xc) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:15 executing program 5: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0x10, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000380)={'ip6gretap0\x00'}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000400), 0x4) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 03:35:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffff9c, &(0x7f0000000300)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@loopback, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0x25) fstat(0xffffffffffffffff, &(0x7f0000000900)) getegid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpu.stat\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000a40), 0x0) getegid() getgid() lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000b40)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") [ 423.592391] audit: type=1326 audit(2000000115.982:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12479 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:16 executing program 2: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() semget$private(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) socket$packet(0x11, 0x0, 0x300) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) llistxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/120, 0x78) socket$nl_netfilter(0x10, 0x3, 0xc) 03:35:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) sendmsg$key(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x9, 0x2) 03:35:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000000900)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)="fb", 0x1}], 0x1, &(0x7f0000000480)}}], 0x1, 0x41) 03:35:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffff9c, &(0x7f0000000300)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@loopback, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0x25) fstat(0xffffffffffffffff, &(0x7f0000000900)) getegid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpu.stat\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000a40), 0x0) getegid() getgid() lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000b40)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 03:35:17 executing program 5: accept(0xffffffffffffff9c, &(0x7f0000000480)=@generic, &(0x7f0000000540)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001dc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001f00)=0xe8) lstat(&(0x7f0000001f40)='./file1\x00', &(0x7f0000001f80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002080)) lstat(&(0x7f00000020c0)='./file1\x00', &(0x7f0000002100)) getegid() getpgrp(0xffffffffffffffff) geteuid() getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005ac0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b00)={{{@in, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c40), &(0x7f0000005c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005cc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000005e00)=0xe8) lstat(&(0x7f0000005e40)='./file0\x00', &(0x7f0000005e80)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000005f00)='./file0\x00', &(0x7f0000005f40)) accept$inet(0xffffffffffffffff, &(0x7f0000006140)={0x2, 0x0, @multicast1}, &(0x7f0000006180)=0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000007740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007780), &(0x7f00000077c0)=0xc) lstat(&(0x7f0000007800)='./file0\x00', &(0x7f0000007840)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000078c0)) getresuid(&(0x7f0000007900), &(0x7f0000007940), &(0x7f0000007980)) fstat(0xffffffffffffffff, &(0x7f00000079c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007a80)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000007b80)=0xe8) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007bc0)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000007cc0)=0xe8) lstat(&(0x7f0000007d00)='./file0\x00', &(0x7f0000007d40)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000080c0)) getpid() stat(&(0x7f0000008100)='./file0\x00', &(0x7f0000008140)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000008740)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000087c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008800), &(0x7f0000008840)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008bc0), &(0x7f0000008c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008c40)={{{@in6=@mcast2, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000008d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008d80), &(0x7f0000005fc0)=0xc) 03:35:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='L\x00\x00']}) 03:35:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) 03:35:17 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(&(0x7f0000000000)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) setreuid(0x0, r0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.SMACK64TRANSMUTE\x00') accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x16, 0x0, 0x5, 0x9, 0x0, 0x67}}) 03:35:17 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(&(0x7f0000000000)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) setreuid(0x0, r0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.SMACK64TRANSMUTE\x00') accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x16, 0x0, 0x5, 0x9, 0x0, 0x67}}) 03:35:17 executing program 1: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x0, &(0x7f0000000000), 0x0, r3, 0xfffffdfd}) 03:35:17 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000400)}) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000140), &(0x7f0000000240)='keyringvmnet0!\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(0xffffffffffffffff) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getgroups(0x0, &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getegid() getpid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) geteuid() lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpgid(0x0) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}}}, &(0x7f00000018c0)=0xe8) getgroups(0x0, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) getresuid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) getgroups(0x0, &(0x7f0000001a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) getuid() getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b80)={{{@in6=@local, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001c80)=0xe8) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000002200)=0xc) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) gettid() geteuid() getgid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002300)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000002400)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002440)) lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000025c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002e40)) getuid() getgroups(0x0, &(0x7f0000002e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003080)) getuid() lstat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:17 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:35:17 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(&(0x7f0000000000)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) setreuid(0x0, r0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.SMACK64TRANSMUTE\x00') accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x16, 0x0, 0x5, 0x9, 0x0, 0x67}}) 03:35:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@ipv4, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffff9c, &(0x7f0000000300)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@loopback, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0x25) fstat(0xffffffffffffffff, &(0x7f0000000900)) getegid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpu.stat\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000a40), 0x0) getegid() getgid() lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000b40)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=""/20, 0x14}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 03:35:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) prctl$setname(0x23, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001080)=@filter={'filter\x00', 0xe, 0x5, 0x176, [0x0, 0x20000200, 0x20000340, 0x20000d74], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}, 0x1ee) 03:35:18 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f00000000c0)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000580), &(0x7f00000005c0)=0x20) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000600), &(0x7f0000000680)=0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040), 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="cf2d026c26af"}, 0x14) openat$urandom(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000380), &(0x7f0000000500)=0x8) rt_sigreturn() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x98) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000003c0)) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)}) 03:35:18 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(&(0x7f0000000000)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) setreuid(0x0, r0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.SMACK64TRANSMUTE\x00') accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x16, 0x0, 0x5, 0x9, 0x0, 0x67}}) 03:35:18 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000900)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xfffffffffffffd12) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)="2c402f73656c696e75781447504c7070703000", 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @remote}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") gettid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003340), &(0x7f0000003380)=0xc) [ 425.629014] kernel msg: ebtables bug: please report to author: entries_size too small 03:35:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:35:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:18 executing program 1: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x10) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:35:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x1, {{0x7}}}, 0x28) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) 03:35:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x5}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) write$binfmt_misc(r2, &(0x7f0000000440)={'syz1'}, 0x12000) 03:35:19 executing program 4: clock_gettime(0x7, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000200)={0x0, @time}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000001d00000000000000bf610000000000008510000002000000bf010000000000009500400000000000150100000000001eb7000000000000009500000000000000"], &(0x7f0000000140)="71086518266b77f5d9d05fe947e232a2d78e0e46dc7b32f67f3dd53b755cc699b9b85c015fa75ad008c4c9af88ef21db883a5ccb82e81d0b2f386cb31e742b92b4c745e893d147d84bc535301aeaea7264ae7172a1455ef0dcc6ca230e6754f410e9f6646cf7f9305f6a852f800dc541d833f86988580a78af600724e14d74094b8dc3d1171e4cd6c7b5ed25f52f8dc7544f88cca48e49caf84e32cd970eb1f592530c47291ace77da548dd76bdf122071c6ff034c1f96bfbb2148bc6697ab36947fa49c29ea5d8a434ac1b0fb6c08820d262c59da370784b1197debe39fa535"}, 0x48) close(r0) 03:35:19 executing program 0: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) epoll_create(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=@random={'security.', '/dev/rtc#\x00'}, &(0x7f0000000480)=""/128, 0x80) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pipe2(&(0x7f0000000200), 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in6=@ipv4={[], [], @multicast2}}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0x151) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000680)={@mcast2}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) 03:35:19 executing program 2: eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000180)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 03:35:19 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000800)) 03:35:19 executing program 1: openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000480)=0xfffffef2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) pipe2(&(0x7f0000000340), 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getegid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000000e40)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001040)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getgid() gettid() lstat(&(0x7f0000002840)='./file0/file0\x00', &(0x7f0000002880)) getgroups(0x0, &(0x7f0000002900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002ec0)) getuid() getgid() gettid() fstat(0xffffffffffffffff, &(0x7f0000003180)) getgroups(0x0, &(0x7f0000003200)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000000040)=0xc) getresgid(&(0x7f00000032c0), &(0x7f0000003300), &(0x7f0000003340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003380)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003dc0)={{{@in=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000003ec0)=0xe8) getegid() syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:19 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000180)) 03:35:19 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0xe8) stat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getgroups(0x0, &(0x7f00000048c0)) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000004ac0)=0xe8) getegid() getpid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getresgid(&(0x7f00000069c0), &(0x7f0000006a00), &(0x7f0000006a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) stat(&(0x7f0000008d80)='./file0\x00', &(0x7f0000008d00)) getresgid(&(0x7f0000006bc0), &(0x7f0000006c00), &(0x7f0000006c40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006cc0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000006dc0)=0xe8) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) getpid() getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006ec0), &(0x7f0000006f00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f40)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000007040)=0xe8) lstat(&(0x7f0000007080)='./file0\x00', &(0x7f00000070c0)) getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000008400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x400000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x28) 03:35:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000100)={&(0x7f0000000000)=""/118, 0x76}) keyctl$get_security(0x13, 0x0, &(0x7f0000000340)=""/183, 0x204) 03:35:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f0000000440)=0x4) getgid() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:20 executing program 0: accept4(0xffffffffffffffff, &(0x7f0000000200)=@ax25, &(0x7f0000000280)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000003c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffff8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000480)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) keyctl$get_security(0x11, 0x0, &(0x7f0000000540)=""/74, 0xffffffffffffff48) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:20 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x0) accept(0xffffffffffffffff, &(0x7f0000000540)=@hci, &(0x7f00000005c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002840)={{{@in6=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000002940)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002c00)={'veth1_to_bond\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000002d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002dc0), &(0x7f0000002e00)=0x14, 0x0) 03:35:20 executing program 2: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f00000008c0)=""/238, 0xee) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:20 executing program 3: io_setup(0xf45, &(0x7f0000000300)) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c00)="637075616363bfde0c958fb46dc3b5d767c9959caf1fe996693051f4312c0633377a3f701f006370755f7573657200", 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000900)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000980)='/dev/vcsa#\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vcs\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b00)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) 03:35:20 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000480)={0x0, &(0x7f0000000440)}) keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:21 executing program 5: socket$inet(0x2, 0x20000010000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000001340)={0x0, &(0x7f0000001300)}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) socket$nl_route(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20}, 0x20}}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000003c0)=@pppol2tpin6, 0x80) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:21 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000045c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) 03:35:21 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004640)={'ipddp0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@mcast1}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'bcsh0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c40)={{{@in=@broadcast, @in6=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000004d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004f40)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005000)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000005100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005200)={@mcast2}, &(0x7f0000005240)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005300)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005400)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006000)={{{@in6=@mcast2, @in6}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000087c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a7c0)={@dev, @loopback}, &(0x7f000000a800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a840)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f000000a940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000aa40)={@local, @multicast1}, &(0x7f000000aa80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ab80)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000acc0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000ad00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ad40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000adc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ae80)={0x0, @rand_addr, @loopback}, &(0x7f000000aec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f000000b000)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000b040)=@ll, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bbc0)={&(0x7f0000000540), 0xc, &(0x7f000000bb80)={&(0x7f000000b100)=ANY=[]}}, 0x0) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:21 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffd) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000004c0)) getgroups(0x8, &(0x7f0000000280)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) pipe(&(0x7f0000000200)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getegid() 03:35:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x7fe, 0x1000000ff) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x6, @mcast1}, 0x1c) recvmmsg(r1, &(0x7f0000009600)=[{{0x0, 0x49, &(0x7f0000006300)=[{&(0x7f0000005200)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/150, 0x96}}, {{0x0, 0x0, &(0x7f00000095c0), 0xd6}}], 0x2, 0x2000, &(0x7f00000097c0)={0x0, 0x1c9c380}) 03:35:21 executing program 4: sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000700)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) uselib(&(0x7f0000000080)='./file1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget$private(0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:21 executing program 3: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) unshare(0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) 03:35:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="00e8ffff7f0000e77c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xe4ffffff, 0x2f}, [@ldst={0x2000cfad}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x48d, &(0x7f000000cf3d)=""/195}, 0x18) 03:35:22 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x101002, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000580)=""/137}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/65, &(0x7f00000001c0)=0x41) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:22 executing program 5: syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000180)="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") write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:22 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f00000008c0), &(0x7f0000000500)="657468302da78100", 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x2) 03:35:22 executing program 0: socket$packet(0x11, 0x2, 0x300) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) mmap(&(0x7f0000247000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:35:22 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) eventfd2(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) chdir(&(0x7f00000004c0)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000580)='/proc/self/net/pfkey\x00'}, 0x30) ftruncate(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000440)) timerfd_create(0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") sched_setattr(0x0, &(0x7f0000000180), 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000400)) 03:35:22 executing program 4: clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x9}, 0x28, 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000002c0)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 03:33:20 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) gettid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400), 0xc, &(0x7f0000000080)={&(0x7f00000004c0)=@bridge_getneigh={0x20}, 0x20}}, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000300)=""/68, 0x44, 0x0, &(0x7f0000000140)=@hci, 0x7070a0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4110dd4ac1e5d31a3b744dbe271fb0703") 03:33:20 executing program 1: socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) [ 430.708406] audit: type=1326 audit(2000000000.160:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12782 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000640)={[{@swidth={'swidth', 0x3d, 0x5}}, {@noalign='noalign'}]}) 03:33:20 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x48001, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0xffffff7f00000000}, 0x14}}, 0x0) [ 430.944280] XFS (loop0): sunit and swidth options incompatible with the noalign option 03:33:20 executing program 1: socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 03:33:20 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1400000000000000290000003e00000004000000"], 0x14}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x1bb, 0x0) 03:33:20 executing program 0: clock_getres(0x90000000, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:20 executing program 2: prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000006380), &(0x7f00000063c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000680)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000010c0)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000002780), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[], &(0x7f0000001140)) pipe2(&(0x7f0000000180), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001180)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) io_setup(0x0, &(0x7f0000000380)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) 03:33:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x8) [ 431.499644] audit: type=1326 audit(2000000000.160:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12782 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:20 executing program 3: clock_gettime(0x7, &(0x7f0000000240)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 4: request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) creat(&(0x7f00000004c0)='./file0\x00', 0x0) dup(0xffffffffffffffff) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000380)) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000003c0)=""/70) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f0000000580)=""/198) syz_execute_func(&(0x7f0000000500)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}}, 0x0) 03:33:20 executing program 5: getpid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x8000, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x8, 0x0, 0x8000) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000200)=@abs, 0x6e) 03:33:20 executing program 1: socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 03:33:20 executing program 5: mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f00000003c0)=""/218) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000005c0)=ANY=[]) eventfd2(0x0, 0x0) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ustat(0x0, &(0x7f0000000140)) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0xfffffffffffffff8) getuid() getgroups(0x0, &(0x7f0000000280)) accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 03:33:20 executing program 1: socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xa6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x80008) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 03:33:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), &(0x7f0000000740)=0x8) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)=ANY=[]) keyctl$invalidate(0x15, 0x0) iopl(0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:33:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r1, &(0x7f00000003c0), 0x101d0, 0x0, 0x0, 0x0) 03:33:20 executing program 2: creat(&(0x7f0000000140)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000600), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@local, @dev}, &(0x7f0000000180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001400)={@mcast1}, &(0x7f0000001440)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001600)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001740)={{{@in, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001880)={@broadcast, @local}, &(0x7f00000018c0)=0xc) 03:33:20 executing program 4: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:20 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000480)={'team0\x00'}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000380), 0x4) clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) stat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@remote, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000f80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001000)) fstat(0xffffffffffffffff, &(0x7f0000001040)) getgid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in6, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001300)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001700)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000001800)=0xe8) getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d80)={{{@in6=@dev, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001e80)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 0: prctl$seccomp(0x34, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'gretap0\x00'}, 0x18) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) geteuid() fchmodat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) capget(&(0x7f0000000600), &(0x7f0000000680)) getresgid(&(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000740)=ANY=[]}, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f0000000540)}) 03:33:20 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x12) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0), 0x4) 03:33:20 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000780)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001c80)=0xe8) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000002000)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002080)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@loopback}}, &(0x7f0000002180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000021c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getegid() getpgid(0x0) stat(&(0x7f0000002300)='./file1\x00', &(0x7f0000002340)) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002500)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002600)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002700)) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getgroups(0x0, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000028c0)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000029c0)=0xe8) stat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)) getpgrp(0x0) stat(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003240)={{{@in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000003340)=0xe8) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003b80)) stat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) stat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003e00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003e40)={{{@in6=@remote, @in6}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000003f40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f80), &(0x7f00000040c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004100)) getresuid(&(0x7f0000004140), &(0x7f0000004180), &(0x7f00000041c0)) getresgid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000042c0), &(0x7f0000004300)=0xc) getegid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004340)='./file0\x00', &(0x7f0000004380)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004400), &(0x7f0000004440)=0xc) lstat(&(0x7f0000004480)='./file0/file0\x00', &(0x7f00000044c0)) getresgid(&(0x7f0000004540), &(0x7f0000004580), &(0x7f00000045c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004740), 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:20 executing program 2: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000540), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000500), &(0x7f0000000340)=0x164) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000480), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:21 executing program 0: prctl$seccomp(0x21, 0x0, &(0x7f0000000080)={0x321, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @local}, &(0x7f00000005c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000f40)=0xe8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000d80)='net/l2cap\x00') socket(0x0, 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000e00)) syz_open_procfs(0x0, &(0x7f0000001740)='net/if_inet6\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001700)=0xfffffe84) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/rfkill\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @rand_addr, @multicast2}, &(0x7f0000001180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast1}, &(0x7f0000001200)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000680)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000b80)={0x13, 0x10, 0xfa00, {&(0x7f0000000800)}}, 0x18) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @multicast1}, &(0x7f0000001280)=0xc) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:21 executing program 5: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000600)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@multicast1}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000c00)=0xe8) getuid() getuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getgroups(0x0, &(0x7f0000000fc0)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefac462f19de55dc4617d2b231a010d64ac1e5d31a3b786e2989f7f") 03:33:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:21 executing program 5: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) prctl$void(0x0) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000ac0)=ANY=[]) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x32, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x9, 0x5, 0x401, 0x0, 'syz0\x00', 0x9}, 0x2, 0x0, 0x90e1, r3, 0x2, 0x101, 'syz1\x00', &(0x7f0000000100)=['posix_acl_access:em1@\x00', '\'.ppp0-wlan0md5sum}-!procppp1\x00'], 0x34, [], [0x0, 0x3f, 0x0, 0x81]}) 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x4c, &(0x7f0000000040), &(0x7f0000000140)=""/76}, 0x28) 03:33:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d6, 0x0) 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x4c, &(0x7f0000000040), &(0x7f0000000140)=""/76}, 0x28) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd00000010000100050c0c00fcff0000040e05a5", 0x58}], 0x1) 03:33:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) 03:33:23 executing program 5: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000480)="0a5cc80700315f85715070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x3, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x4c, &(0x7f0000000040), &(0x7f0000000140)=""/76}, 0x28) 03:33:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) [ 436.413157] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 03:33:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x4c, &(0x7f0000000040), &(0x7f0000000140)=""/76}, 0x28) 03:33:23 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getpgid(0xffffffffffffffff) gettid() fcntl$getown(0xffffffffffffffff, 0x9) gettid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) accept(0xffffffffffffff9c, &(0x7f0000001d80)=@un=@abs, &(0x7f0000001e00)=0x80) syz_open_dev$mice(&(0x7f0000001e40)='/dev/input/mice\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000001f00)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000001f40)=0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001f80)) open(&(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$rfkill(0xffffffffffffff9c, &(0x7f0000002100)='/dev/rfkill\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002140)) getpgid(0x0) gettid() pipe2(&(0x7f0000000980), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/cuse\x00', 0x2, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000004340)=@setlink={0x24, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x4}]}, 0x24}}, 0x0) 03:33:23 executing program 2: mlock(&(0x7f0000565000/0x1000)=nil, 0x1000) socketpair$unix(0x1, 0x400000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d6, 0x0) 03:33:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) syz_mount_image$ext4(&(0x7f0000000000)="00000400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000180)=ANY=[]) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x100, 0x8000) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000600)={0x14e, 0xcb0, 0x5, 0x20, 0xffff, 0x1, 0x5, 0x0, 0x1, 0xd6}) pipe2(&(0x7f00000004c0), 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x7f, 0x3, 0x1000]}, &(0x7f0000000480)=0xe) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_REG_LIST(r2, 0x400452c9, &(0x7f0000000380)=ANY=[@ANYBLOB="1d"]) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, r2, 0x9) 03:33:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) 03:33:24 executing program 0: r0 = socket(0x40000000015, 0x40000000000005, 0x0) setsockopt(r0, 0x100000114, 0x1d, &(0x7f0000c63ffc)="66014ebe", 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f00003e9ffc), &(0x7f0000727ffc)=0x4) 03:33:24 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x3d, 0x20000008, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040), 0x4) r2 = open(&(0x7f0000002000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x99b3) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 436.844168] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:33:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) 03:33:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc}, 0x21b}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000400)) lstat(&(0x7f0000000380)='./bus/../file0\x00', &(0x7f0000000480)) 03:33:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) syz_mount_image$ext4(&(0x7f0000000000)="00000400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000180)=ANY=[]) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x100, 0x8000) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000600)={0x14e, 0xcb0, 0x5, 0x20, 0xffff, 0x1, 0x5, 0x0, 0x1, 0xd6}) pipe2(&(0x7f00000004c0), 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x7f, 0x3, 0x1000]}, &(0x7f0000000480)=0xe) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_REG_LIST(r2, 0x400452c9, &(0x7f0000000380)=ANY=[@ANYBLOB="1d"]) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, r2, 0x9) 03:33:24 executing program 3: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:24 executing program 1: add_key(&(0x7f0000000100)="6173796d6d65747269630000f623c165dbdd5da4e516feae1218931b7f62f1989e779cb3e199015e6f224dc786b78b696462c7dec58cd05fa42773a0af0a703d63e19620fd165b5d862cf73505bb401152746037a51f9d035dcf4197d265f6f5d246b14212db69e767574420fb11a7308eb293967dbd5a729bb8c6833a854e2036d4e9270fef4cef270638e56c144263ecf69038c96c9d38f68668c21513e19c1311eea8ee94c59609987d033ca3c8ad624dbc5c8958aaa4e9158c5850c6228a22d0adaabe8bb566c069d5baa64e30af6d878c", &(0x7f0000000080), &(0x7f0000000000), 0xfffff, 0xfffffffffffffffd) 03:33:24 executing program 2: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d6, 0x0) 03:33:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) syz_mount_image$ext4(&(0x7f0000000000)="00000400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000180)=ANY=[]) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x100, 0x8000) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000600)={0x14e, 0xcb0, 0x5, 0x20, 0xffff, 0x1, 0x5, 0x0, 0x1, 0xd6}) pipe2(&(0x7f00000004c0), 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x7f, 0x3, 0x1000]}, &(0x7f0000000480)=0xe) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_REG_LIST(r2, 0x400452c9, &(0x7f0000000380)=ANY=[@ANYBLOB="1d"]) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, r2, 0x9) 03:33:25 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000040)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) syz_mount_image$ext4(&(0x7f0000000000)="00000400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000180)=ANY=[]) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x100, 0x8000) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000600)={0x14e, 0xcb0, 0x5, 0x20, 0xffff, 0x1, 0x5, 0x0, 0x1, 0xd6}) pipe2(&(0x7f00000004c0), 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x7f, 0x3, 0x1000]}, &(0x7f0000000480)=0xe) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$KVM_GET_REG_LIST(r2, 0x400452c9, &(0x7f0000000380)=ANY=[@ANYBLOB="1d"]) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, r2, 0x9) 03:33:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000140)={'bridge0\x00', &(0x7f0000000100)=@ethtool_cmd={0x8}}) 03:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d6, 0x0) 03:33:25 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mount(&(0x7f000000a000), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) poll(&(0x7f00000002c0), 0x0, 0x400007e) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') 03:33:25 executing program 5: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000580), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:25 executing program 3: umount2(&(0x7f0000000200)='./file0\x00', 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpriority(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7da, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:25 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x100000000) 03:33:25 executing program 2: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) pipe(&(0x7f0000000200)) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) llistxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/4096, 0x1000) pipe2(&(0x7f0000001640), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:26 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240), &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000380)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) setuid(0x0) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @rand_addr, @multicast2}, &(0x7f00000008c0)=0x27b) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @local}, @in6=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @broadcast}, &(0x7f00000010c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a80)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003b80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003bc0)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000003cc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003d00), &(0x7f0000003d40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d80)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000003e80)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004740), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000047c0)={"62816964675c70fc7c90a2655f3100"}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004800)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000004900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004940)={@dev}, &(0x7f0000004980)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000049c0), &(0x7f0000004a00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004ac0)={@loopback}, &(0x7f0000004b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001140)={{{@in6=@local, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008bc0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000008c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008c80)={@dev, @multicast1}, &(0x7f0000008cc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008d40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009500)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000009540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009580)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009c80)={'bridge_slave_1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@loopback, @multicast1}, &(0x7f0000009d00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000a8c0)={&(0x7f0000000780), 0xc, &(0x7f000000a880)={&(0x7f0000009d40)=ANY=[]}}, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) clock_gettime(0x0, &(0x7f0000000500)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) pipe2(&(0x7f0000000140), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000006c0)={'IDLETIMER\x00'}, &(0x7f0000000700)=0x1e) wait4(0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)) 03:33:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local, [0x3f9, 0x10000000000000]}], 0x10) 03:33:26 executing program 0: seccomp(0x2, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='{\x00', 0xffffffffffffff9c}, 0x10) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x84800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB=',access=user,ver']) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8921, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r5, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000007c0)={@local, r6}, 0x14) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r5, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r2, 0x0) 03:33:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local, [0x3f9, 0x10000000000000]}], 0x10) 03:33:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x84800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB=',access=user,ver']) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8921, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r5, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000007c0)={@local, r6}, 0x14) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r5, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r2, 0x0) 03:33:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, "73656400f2ffffff020000000200"}, 0x2c) memfd_create(&(0x7f0000001100)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000680), &(0x7f00000006c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000008c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@remote, @remote}, &(0x7f0000000140)=0xc) accept(0xffffffffffffffff, &(0x7f0000000a40)=@hci, &(0x7f0000000ac0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d00)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000ec0), 0x0, &(0x7f0000000f00)=""/70, 0x46}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001000)={'tunl0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@mcast1}, &(0x7f0000000340)=0xfffffffffffffe3a) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007300)={{{@in, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000007400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000074c0)={{{@in=@multicast1, @in6}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000075c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000076c0)={{{@in6=@dev, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000077c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000bdc0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000be00)={0x0, @rand_addr, @multicast1}, &(0x7f000000be40)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000be80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0xffbe) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000bf00)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf40)={@loopback}, &(0x7f000000bf80)=0x14) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac19086d9f28fc94e2179fb0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local, [0x3f9, 0x10000000000000]}], 0x10) 03:33:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000a80)=""/237) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) mlockall(0x0) 03:33:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local, [0x3f9, 0x10000000000000]}], 0x10) 03:33:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x84800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB=',access=user,ver']) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8921, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r5, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000007c0)={@local, r6}, 0x14) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r5, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r2, 0x0) 03:33:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:27 executing program 1: uselib(&(0x7f0000000080)='./file0\x00') lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0), 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f00000001c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:27 executing program 4: clock_gettime(0x4000000000009, &(0x7f0000000500)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[]}}, 0x0) getgid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)) modify_ldt$read_default(0x2, &(0x7f0000000380)=""/94, 0x5e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast1, @local}, &(0x7f0000000440)=0xc) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000480)={0x0, 0x1, 0x6, @dev}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) 03:33:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x84800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB=',access=user,ver']) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8921, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r5, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000007c0)={@local, r6}, 0x14) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RGETATTR(r5, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r2, 0x0) 03:33:27 executing program 2: socket$packet(0x11, 0x2, 0x300) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) mmap(&(0x7f0000247000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getpgid(0x0) syz_execute_func(&(0x7f00000000c0)="0fae5a00c4419f2a910000002165420f380018450f38054a468f6880a27700da0fc403f9c442f99953002e2ef30f536e10c442512d7c7f0fc403c95fc356") 03:33:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000019c0)) dup3(r2, r0, 0x0) 03:33:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:28 executing program 2: nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000002c0)='!vboxnet0&\x00', 0xffffffffffffff9c}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000840)=0x1c, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgpoup(\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)=""/192, 0x0, 0xc0}, 0x20) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0xffffffffffffff50) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000580)={&(0x7f00000007c0)={0x14}, 0xfffffffffffffff0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000500)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={'teql0\x00', {0x2, 0x0, @dev}}) 03:33:28 executing program 5: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x8002) ioctl$int_in(r0, 0x80000000005008, &(0x7f0000000040)) 03:33:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x25b, 0x4) 03:33:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000140)=""/194, 0xc2}], 0x1, &(0x7f00000015c0)=""/24, 0x18}, 0x0) 03:33:28 executing program 1: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00001c9fff), 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000e80), 0x0, 0x0, &(0x7f0000000fc0)) sendmmsg(0xffffffffffffffff, &(0x7f0000005700), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 03:33:28 executing program 5: pipe2(&(0x7f00000000c0), 0x1f2) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000140)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000680)={@local}, &(0x7f00000006c0)=0x14) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x0, 0x0, "081630e72c918f2f797458fa36fac546"}, 0x15, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000640)=0x6e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @empty, @loopback}, &(0x7f00000007c0)=0xc) accept(0xffffffffffffffff, &(0x7f0000000800)=@can, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@dev, @dev}, &(0x7f0000000f40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f80)={@broadcast, @loopback}, &(0x7f0000000fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000400), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @local, @broadcast}, &(0x7f0000001180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:28 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xb000400) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc001, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x3d}, 0x7fc) 03:33:28 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x3, &(0x7f0000000140)=0xfffd, 0x4) set_mempolicy(0x0, &(0x7f0000000080), 0x1) 03:33:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000003c0)=""/15, 0xf}}], 0x1, 0x2001, &(0x7f0000003440)={0x0, 0x1c9c380}) 03:33:29 executing program 3: r0 = socket$inet6(0xa, 0x8000000000000806, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1}, 0x8) close(r0) 03:33:29 executing program 2: nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000002c0)='!vboxnet0&\x00', 0xffffffffffffff9c}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000840)=0x1c, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgpoup(\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)=""/192, 0x0, 0xc0}, 0x20) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0xffffffffffffff50) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000580)={&(0x7f00000007c0)={0x14}, 0xfffffffffffffff0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000500)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={'teql0\x00', {0x2, 0x0, @dev}}) 03:33:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000003c0)=""/15, 0xf}}], 0x1, 0x2001, &(0x7f0000003440)={0x0, 0x1c9c380}) 03:33:29 executing program 3: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000003c0)=""/15, 0xf}}], 0x1, 0x2001, &(0x7f0000003440)={0x0, 0x1c9c380}) 03:33:29 executing program 1: keyctl$set_reqkey_keyring(0x16, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000003c0)=""/15, 0xf}}], 0x1, 0x2001, &(0x7f0000003440)={0x0, 0x1c9c380}) 03:33:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x65, &(0x7f0000013e95), 0x4) setsockopt$inet6_opts(r2, 0x29, 0x10, &(0x7f0000000000)=@routing, 0x8) close(r2) close(r1) 03:33:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000005c0), r1, 0x0, 0x0, 0x1}}, 0x20) 03:33:30 executing program 0: prctl$setname(0x1b, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400), 0xc) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:30 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300), 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f0000000240)}) 03:33:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000005c0), r1, 0x0, 0x0, 0x1}}, 0x20) 03:33:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000005c0), r1, 0x0, 0x0, 0x1}}, 0x20) 03:33:30 executing program 2: nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000002c0)='!vboxnet0&\x00', 0xffffffffffffff9c}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000840)=0x1c, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgpoup(\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)=""/192, 0x0, 0xc0}, 0x20) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0xffffffffffffff50) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000580)={&(0x7f00000007c0)={0x14}, 0xfffffffffffffff0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000500)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={'teql0\x00', {0x2, 0x0, @dev}}) 03:33:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000005c0), r1, 0x0, 0x0, 0x1}}, 0x20) 03:33:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2402, 0x0) 03:33:30 executing program 4: mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @local, @loopback}, &(0x7f0000001640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001900)={@local, @multicast1}, &(0x7f0000001940)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'teql0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b80)={0x0, @broadcast, @remote}, &(0x7f0000001bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@loopback, @multicast2}, &(0x7f0000001c40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x1f07ce351438e49e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001e40)=@xdp, &(0x7f0000001ec0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f40)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 443.144700] cgroup: fork rejected by pids controller in /syz4 03:33:30 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) memfd_create(&(0x7f00000000c0)='#\x00', 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000fc0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001000)=@can, &(0x7f0000001080)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001100)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001140), &(0x7f0000001180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000011c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000001340)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001400)=@xdp, &(0x7f0000001480)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6=@mcast2, @in6}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004e40)={&(0x7f0000000240), 0xc, &(0x7f0000004e00)={&(0x7f00000048c0)={0x14}, 0x14}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8408a) fallocate(r1, 0x10, 0x0, 0xa343) 03:33:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:30 executing program 4: mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) readv(r0, &(0x7f00001f2ff0)=[{&(0x7f0000001fb2)=""/1, 0x1}], 0x1) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000001c0)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000011000)) close(r1) 03:33:31 executing program 0: prctl$setname(0x1b, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400), 0xc) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:31 executing program 4: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1e000000) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000900)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f0000004300)}, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@l2, &(0x7f00000008c0)=0x80, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="000427bd7000fddbdf2509000000380003000800010000000000080001000000000008000500e00000021400020079616d3000000000000000000000000008000500ac1414aa6c00030014000600fe8000000000000000000000000000bb0800030004000000080001000100000014000600fe80000000000000000000000000000b140002007465616d300000000009000000000000140006008b700000000000000000000000000000000008000800ff0000000800040001004be31263e4f838156f54718b8585ab6b05c69165b5714f03b931f05afb1db695a6992eb04300ca45deb967c2d50241c140ea3c2257208290253ef39cb7dbec605708533ae7ffe059921ca741b977d598c3df211734953e1e76ea4c7019f7d73733f96ffc0cc86c7a528cac2fee0261ea0e79d52a0ac247cdfe91e9bf3ba5749336561a59045abbd075f7e57da04847783d538e2221383ba79703ebfefb7a3cb488d0011b6f476540580d33052b29258f34e27ddeb86f644eca9208226037a83e664e584c36939b3485"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="bd40b28b79078fa8f16e09dba883d34b85882396eaf58995b90dbc7b1a041d14e2bc18f8892798b6024d6aae5110361b909e7a2ab66135247dda03cb06ad82f4f4e9c2cc3c0c800d9e0c300a5b5966df4a89aba438a45480c88dc704911e2ca18c58938d7e9a0b6cff532953bb9d530cea49b3a44f6fabc12c4f597845a13dd250a6e28c8b3771720c82dc9846d78741ed265b549157e23e78cb42c5b297aabc44a17b6edf78ef9fe2cf386aa5e0abbe3379a9ae4a1fb3d942ad3eae29b9cb08410a3cd3c13904720ee9fb416f96fda3091943c07afc2448d510e60152d630a01381296ce9a36269d37b8e936d02955a263ce43d3903cc3c28ffd9a31a77552b6d159751da28bdc5ebec9ed45a63ca7a1dce7f323ab14dccd7feda9b74be83200ab2f6f7413b244dfc49debb821b6798b9267a6086a23eb1dfb9614a7ef4a5cf8b95fd59be0c2165bde32f9f752c41e818a7f60d3af516cb4538e39217cf15052e2286c1aeda94b309e9d4883e7035a0c93c37ca926d1028a3eabecfda94f175472cc4bdf18a99c4fbc29fba3e31c3749da8e6c28d0845dc0d9883f6251428364cb1005e763a1a17a58fc135396fa9cb96e7257c5f9ef140164361dbdb2d877126bb39143259e1bdea78cbe892b58650dd3be219914a355c9245f1e8a6ee8706094d58eb154af019d281095246ba3b9ead4ae664feee0e0bef626fa1255f2c8a373118438bbc84ac011dcba9d04495d3720f62320a6da471388b68ae2a18a94f6688fb2afef36578142e4bca80f0ae78dc5e70ebd300179734c3d666499ea60c0098f567a847288f7e82b23ec2f5a0a91d548b776559c164473b8d51cdd83dfe28ca327015c99d073a4f148c15ea1a9a8d51b971b7376f4dc1c665ef8d5b85185ce135c0f22b2412760d980fe011af8214c1567b1f26ae169ffe8ea567c025b85e607422ce0d16e3e93ea2de508cf373c0f8563902cabae3a56d935254661036242a75a3176b0af19340961c782e3a71bad9608884de1a0d0c44f11189cf87d6f6bfc86d5003bc42df6edd38bf2e30742d64a2e943f88968e41447bbeaf1777f4028b8c6dcee8ef1db28cc1482d11d6003e0df62623f95c65a40ccf5639c4dd6ddaee3236b0edfb35a34ccd74428bbb369a9487527223c3b89fa309da0b091c1f906cb598f366aea12c2574368dff9cd49e5d52e6a7483518e5825cdb517200dbeb5a565a0221fad51e50fe7b498535acda8fc6c216296750514ea894a990a254d8449faacdc856c979f81e80bf4f33e3fd742bb6330dd04cbd757170386e03b17111b1587408c6bface9e04d2a9a93e5f556daf18e5d95c1cccd0b9ae6592219547b90414977ec4cc7af5d2c38a06da735bf507112794addb520f71b16aa4819d7f9751131da216d0abff30434c43257edd82557695e0cadb6365034ce7657c262ec218245e102ff8a54a802b93bd0d6766a51864cd2ea4343c03a7420943431c3cf511bb43fc803f26285eaae9ec2a12c0c8746da16b71f84c1c72c6cc2fc501c1955ec0173c0fbc924c7658db4f3e0be06ac9489d42594d82637da3956930fe622860ebef21856e5901f6114bea931d20e7b0d344945738b9933a005ee7b9e3c9d2fb6087dbaaa450df6a79f811e784bd6f1dfbc374b9306d06cb87b201f4d6343feb038cbf5b867e151a0ca42ffd8fa388816f49a5d3a7871f6cdc0fa8d20891c58278b6ec13ac3058e5a4c90020734eb8703c84e53f8a326a822e48a263bca81ce73336390abb7361ef8261ecb843f4fab678c23441155f5166f16804a185f20051628d79c9087d42b58f3f5a25747c67c5e3de41b59c8bf89ee63bcae138dc09bc836ebec2e4cb597cd67d7afd1d7cc579efd65109c43038b12d31bfe3e9da2d187829e34be0d685dba1f7415c29a3aad9564a7f2023034e3768cf5a8f67c3a646b7d68e1d811a97e54ec0f66c11dec48ba081b57cc53a4e65925e22c8", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:31 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:31 executing program 2: nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000002c0)='!vboxnet0&\x00', 0xffffffffffffff9c}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000840)=0x1c, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgpoup(\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)=""/192, 0x0, 0xc0}, 0x20) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0xffffffffffffff50) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000580)={&(0x7f00000007c0)={0x14}, 0xfffffffffffffff0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000500)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={'teql0\x00', {0x2, 0x0, @dev}}) 03:33:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [{0x40000101}]}) 03:33:31 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:31 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x88000) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:33:31 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000ac0)=ANY=[]) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:31 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:31 executing program 4: clock_gettime(0x7, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000005c0)=""/247, 0xf7}, 0x120) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) 03:33:32 executing program 0: prctl$setname(0x1b, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400), 0xc) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000080)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f00000004c0), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000680)={@local}, &(0x7f0000000540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @empty, @loopback}, &(0x7f00000007c0)=0xc) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000c80)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:32 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000e40)={&(0x7f0000000200), 0xc, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB="000427bd7000fddbdf2509000000380003000800010000000000080001000000000008000500e00000021400020079616d3000000000000000000000000008000500ac1414aa6c00030014000600fe8000000000000000000000000000bb0800030004000000080001000100000014000600fe80000000000000000000000000000b140002007465616d300000000009000000000000140006008b700000000000000000000000000000000008000800ff0000000800040001004be31263e4f838156f54718b8585ab6b05c69165b5714f03b931f05afb1db695a6992eb04300ca45deb967c2d50241c140ea3c2257208290253ef39cb7dbec605708533ae7ffe059921ca741b977d598c3df211734953e1e76ea4c7019f7d73733f96ffc0cc86c7a528cac2fee0261ea0e79d52a0ac247cdfe91e9bf3ba5749336561a59045abbd075f7e57da04847783d538e2221383ba79703ebfefb7a3cb488d0011b6f476540580d33052b29258f34e27ddeb86f644eca9208226037a83e664e584c36939b3485"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x0, 0x7, 0x7, 0x100000000, 0x2000000000, 0xff}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2b05e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688537d9bd0db4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @local, 0x1}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x21}], 0x38) recvmsg$kcm(r2, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) accept$unix(r2, 0x0, &(0x7f0000000f00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:33:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:33:32 executing program 5: setrlimit(0x7, &(0x7f0000000040)={0x0, 0x8000000}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000940), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000600)={0x0, &(0x7f00000001c0)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000340)=""/7, 0x7, 0x0, &(0x7f0000000580)=@un=@file={0x0, './file0\x00'}, 0x80) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) socket(0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0xf0) pipe(&(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000140)=0xffffffffffffff2b) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:32 executing program 4: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) accept(0xffffffffffffff9c, &(0x7f0000000900)=@pppol2tpv3in6, &(0x7f0000000480)=0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000b80), &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c80)=ANY=[], &(0x7f0000000c40)) syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000005c0)=""/225, &(0x7f00000006c0)=""/239, &(0x7f00000007c0)=""/205}) pipe(&(0x7f0000000b40)) get_mempolicy(&(0x7f0000000dc0), &(0x7f0000000e00), 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0), 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000280)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000b00)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000980)}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000a00)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local}}}, 0x30) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000a80)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000540)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='bridge_slave_0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@loopback}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) sched_getattr(0x0, &(0x7f00000004c0), 0x30, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00') syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440), 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000400), 0x8) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000600)={&(0x7f0000000540)=""/183}, 0x18) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) pipe2(&(0x7f00000001c0), 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000002e40)={0x0, 0x0, 0x2080}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000200)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000640)=""/4096) 03:33:32 executing program 1: keyctl$set_reqkey_keyring(0x1d, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:32 executing program 3: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000be00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000be40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000bf80)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000c080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000c180)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000c1c0)={{{@in=@multicast1, @in6}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000c2c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000c340)={'nr0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000c380)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f000000c480)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000c4c0)={'irlan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000c5c0)={@mcast2}, &(0x7f000000c600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c6c0)={0x0, @remote, @multicast1}, &(0x7f000000c700)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f000000c740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000c780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c7c0)={0x0, @remote, @multicast1}, &(0x7f000000c800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000cd40)={{{@in=@loopback, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000ce40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ce80)={'bpq0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cec0)={@rand_addr, @dev}, &(0x7f000000cf00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:32 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x28, 0x13, 0x205, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKMODE={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 03:33:32 executing program 4: keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:33 executing program 0: prctl$setname(0x1b, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400), 0xc) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:33 executing program 2: clock_gettime(0x6, &(0x7f0000001300)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000180)=""/4096) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001180), 0x8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:33 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240), 0x8) membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) creat(&(0x7f0000000380)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x10) open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000c00)={0x0, 0x989680}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:33 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000cf1ff4), 0xc, &(0x7f0000703000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840000000000000000000000000000000046659a62290ffc380c2dbfc75e89e106ba4206274d760dfe0597260617e101000006000000001cb4e2bf501db1bb9427ecd8337f6d63cc8769c29c4d91b00ffff0be48b748d3050bc1700612dbc3080c91125fa158cf0d70309f7f19007c8262d732940142ab1cf90b11e0141c63f5f94035"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x20b) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f000053b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:33:33 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000480), 0x4) unlink(&(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000500)={0xb}, 0xb) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000004c0), 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 03:33:33 executing program 1: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:33 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:33:34 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:33:34 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:33:34 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d0000000200001f01000000ec0010c91300010000000f0000006f263f443a5ed758a1", 0x2f}], 0x1}, 0x0) 03:33:34 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:33:34 executing program 2: getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'veth0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001e00)={@ipv4={[], [], @multicast2}}, &(0x7f0000001e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getgid() fstat(0xffffffffffffffff, &(0x7f0000002140)) bpf$MAP_CREATE(0x0, &(0x7f0000001dc0), 0x2c) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) lstat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000004440)=0xc) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)) lstat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000042c0), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000002300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002380)=0x14, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) accept4$packet(0xffffffffffffff9c, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14, 0x0) 03:33:34 executing program 4: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:34 executing program 0: prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) mq_open(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0, &(0x7f0000000140)) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000180)) [ 447.784974] IPVS: ftp: loaded support on port[0] = 21 03:33:35 executing program 1: inotify_init() clock_adjtime(0x0, &(0x7f00000004c0)) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) geteuid() accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000040)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:35 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000005f80)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:33:35 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="18000000310000000000000078"], 0x1}}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) socket$inet6(0xa, 0x1000000000002, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000140)='./file1\x00', 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x40002, 0x0) write$P9_RWRITE(r0, &(0x7f0000000100)={0x7}, 0xfe98) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28}, 0x28) ioctl$FUSE_DEV_IOC_CLONE(r1, 0xc028660f, &(0x7f0000000040)) 03:33:35 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x20, @local}, 0x10) r1 = socket$inet(0x2, 0x80006, 0x0) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0x2, 0x4) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:33:35 executing program 5: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:35 executing program 0: userfaultfd(0x0) times(&(0x7f0000000080)) getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:36 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0xb0d}, 0x28, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000140), &(0x7f0000000180)='rxrpc\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffe8b) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000400)) dup(0xffffffffffffffff) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)) 03:33:36 executing program 0: userfaultfd(0x0) times(&(0x7f0000000080)) getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0), 0x10) 03:33:36 executing program 0: userfaultfd(0x0) times(&(0x7f0000000080)) getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") [ 451.732306] device bridge_slave_1 left promiscuous mode [ 451.738583] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.806067] device bridge_slave_0 left promiscuous mode [ 451.811648] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.941376] team0 (unregistering): Port device team_slave_1 removed [ 453.951907] team0 (unregistering): Port device team_slave_0 removed [ 453.963362] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 454.016170] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 454.076075] bond0 (unregistering): Released all slaves [ 454.226908] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.233394] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.240341] device bridge_slave_0 entered promiscuous mode [ 454.267746] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.274241] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.281253] device bridge_slave_1 entered promiscuous mode [ 454.312880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 454.358792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 454.492840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 454.542626] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 454.761767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 454.769210] team0: Port device team_slave_0 added [ 454.813470] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 454.822311] team0: Port device team_slave_1 added [ 454.865772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.913629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.961894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.009452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.478073] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.484511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.491254] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.497635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.505720] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 456.181328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.627230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.726114] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 456.820466] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 456.826912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.835663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.931707] 8021q: adding VLAN 0 to HW filter on device team0 03:33:45 executing program 0: userfaultfd(0x0) times(&(0x7f0000000080)) getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0), 0x10) 03:33:45 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x20, @local}, 0x10) r1 = socket$inet(0x2, 0x80006, 0x0) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0x2, 0x4) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:33:45 executing program 4: readv(0xffffffffffffffff, &(0x7f00000006c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 03:33:45 executing program 5: timerfd_create(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") 03:33:45 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0xb0d}, 0x28, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000140), &(0x7f0000000180)='rxrpc\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffe8b) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000400)) dup(0xffffffffffffffff) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)) 03:33:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0), 0x10) 03:33:45 executing program 0: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0), 0x10) 03:33:46 executing program 4: readv(0xffffffffffffffff, &(0x7f00000006c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 03:33:46 executing program 3: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000980)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:46 executing program 4: readv(0xffffffffffffffff, &(0x7f00000006c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 03:33:46 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0xb0d}, 0x28, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000140), &(0x7f0000000180)='rxrpc\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffe8b) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000400)) dup(0xffffffffffffffff) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)) 03:33:46 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x20, @local}, 0x10) r1 = socket$inet(0x2, 0x80006, 0x0) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0x2, 0x4) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:33:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000100)={0x1d, r2}, 0x10) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x101, 0x8}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7cf, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000140)) 03:33:46 executing program 4: readv(0xffffffffffffffff, &(0x7f00000006c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 03:33:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x500000c}) 03:33:46 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x500000c}) 03:33:47 executing program 3: clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='$system\x00'}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000140), 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) close(0xffffffffffffffff) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000300)=""/221) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000400)=""/171) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000640)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x500000c}) 03:33:47 executing program 4: getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) lchown(&(0x7f00000015c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000000cc0)=0xe8) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@local, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000010c0)=0xe8) keyctl$session_to_parent(0x12) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in=@dev, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000014c0), 0x0, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000240), 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:47 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="6365706800e993000056b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0144faffff8bc8f9d30f9c55ced1150431a9b1a839bbf3f467d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635adcddfca4f93c509d545d61fa5709bd17e803195711a64cb2ce69fde25ca87e550d13393bc940545a7ef2fa9c0039e7a306d1210c286934192dfe5ecc4e2988d60a5d3e078b18955c779f9292f7b3e223bcb978f7ca1cfe8388f97bdf7adf81db314c17f57fb4f4db4d3713a5ec3da5a57aac2418385e87c4ac81c5650676b06f397b359ccc0d7094a48ab721fe8bdf7813e1dc11e635fb51a8311242c886531b0a19c11", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x500000c}) 03:33:47 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0xb0d}, 0x28, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000140), &(0x7f0000000180)='rxrpc\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffe8b) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000400)) dup(0xffffffffffffffff) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)) 03:33:47 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x20, @local}, 0x10) r1 = socket$inet(0x2, 0x80006, 0x0) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0x2, 0x4) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:33:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:48 executing program 3: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:48 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:48 executing program 5: clone(0x1ed10000, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:48 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:33:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x4, 0x9, 0xfffffffffffffff9}, 0x2c) 03:33:48 executing program 1: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) getpgid(0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000080c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) gettid() lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000009b40)=0xe8) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009b80)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f0000009c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000009cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009e40), 0x0, 0x0) getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000005ac0)={0xffffffffffffffff, &(0x7f0000004ac0)}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:33:48 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'bpq0\x00'}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000600)='/dev/zero\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000003c80)={&(0x7f00000005c0), 0xc, &(0x7f0000003c40)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @empty, @empty, @dev}}}}, &(0x7f0000000400)) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000500), &(0x7f0000000540)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000080)) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4b2c19086d9f28fc9c401ed6aa3a4c60000c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:48 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:48 executing program 1: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 03:33:48 executing program 1: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 03:33:49 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(r1, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5}, 0x401}], 0x1, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:49 executing program 1: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 03:33:49 executing program 3: socket$l2tp(0x18, 0x1, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='GPLvboxnet0*\x00'}, 0x10) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0xffffffffffffff25) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000000180)) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000400)=0x1cf) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0x0) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:49 executing program 0: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:49 executing program 1: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 03:33:49 executing program 4: keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000180), 0x8) syz_execute_func(&(0x7f0000000000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f57c41754545e0932ebc2ebc0d64ac1e5d9f7f") 03:33:49 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) bind$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003880), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)="6e6574a6c5f60ef5be2919fe694a324ca617e92f736e6d703600") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'bridge0\x00'}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 03:33:49 executing program 1: r0 = socket(0x11, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0xc00, 0x0, 0xfffffffffffffffc}, 0x4) 03:33:49 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000280)='\x00') 03:33:49 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000440)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000a00)="f7fbffffff17", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:49 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) 03:33:50 executing program 4: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='cUildren\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:50 executing program 3: clock_gettime(0x1, &(0x7f0000000200)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040), 0xa) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000200), 0x0, 0xfffffffffffffffe) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) prctl$setname(0x59616d61, &(0x7f0000000180)='bdevsel\b\x00groupsElf') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000580)) dup(0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000004100), &(0x7f0000004140)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001100)=""/4096, &(0x7f0000000440)=0x1000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000600)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, &(0x7f0000000740)=""/254) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:33:50 executing program 5: clock_gettime(0x100800000000001, &(0x7f0000000300)) dup(0xffffffffffffffff) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000180)) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000280)) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140), 0x2) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff3e0f0d4bb8c4a291b8c23d233d2341f30f109c93000000006eeefa80a5e70000000ceefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000340)=ANY=[]) 03:33:50 executing program 0: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) geteuid() getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003d00)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getgroups(0x0, &(0x7f0000003ec0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000004040), &(0x7f0000004080), &(0x7f00000040c0)) stat(&(0x7f0000004100)='./file0\x00', &(0x7f0000004140)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000041c0)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000042c0)=0xe8) getgroups(0x0, &(0x7f0000004300)) 03:33:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) dup2(r1, r0) shutdown(r1, 0x0) 03:33:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000001280)="025cc80700145f8f764070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r1, 0xff, 0x1, &(0x7f0000000040)="18", 0x1) 03:33:50 executing program 2: keyctl$set_reqkey_keyring(0x6, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008300)={'bpq0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000008340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008380)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000083c0)={'ifb0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008440)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000086c0)={{{@in6, @in=@local}}, {{@in=@remote}, 0x0, @in6=@ipv4}}, &(0x7f00000087c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008ec0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000008fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009000), &(0x7f0000009040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009080), &(0x7f00000090c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009480)={{{@in6, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000009580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009640)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000009740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009780)={{{@in6, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000009880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000098c0)={@broadcast}, &(0x7f0000009900)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009940)={{{@in=@broadcast, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000009a40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000e880), 0x0, 0x0, &(0x7f000000e9c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ea00), &(0x7f000000ea40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000eb40), &(0x7f000000eb80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000ec00)={{{@in6=@ipv4, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f000000ed00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ed40)={@loopback}, &(0x7f000000ed80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000012080), 0x0, 0x0, &(0x7f00000122c0)={0x0, 0x1c9c380}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000012b40)={&(0x7f00000000c0), 0xc, &(0x7f0000012b00)={&(0x7f0000012b80)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() delete_module(&(0x7f0000000000)=':ploprocbdevvmnet0wlan0:\x00', 0x0) 03:33:51 executing program 4: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='cUildren\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:51 executing program 5: alarm(0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000340)) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) semget(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=0xffffffffffffffff, 0x4) close(0xffffffffffffffff) pipe2(&(0x7f0000000680), 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) io_setup(0x0, &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000840)='wchan\x00') eventfd2(0x0, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000540)=""/153) syz_execute_func(&(0x7f00000004c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:51 executing program 0: timerfd_create(0x7, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) accept(0xffffffffffffffff, &(0x7f0000001480), &(0x7f00000000c0)=0x80) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000180)=""/40) pipe(&(0x7f00000003c0)) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000380)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) prctl$setmm(0x1c, 0x0, &(0x7f0000ff7000/0x2000)=nil) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001680)}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000001700)={0x7, 0x8}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001580)) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000001500)={'vgan0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=""/4096, &(0x7f0000001440)=0x1000) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000300)) sched_rr_get_interval(0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000015c0)={0x0, 0x0, 0x0, 'queue0\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000001540)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) getpgid(0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000240)=0x68) 03:33:51 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:51 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000100)="04c88655d0ba8cab", 0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000001040), 0x0, 0x0, &(0x7f0000000000)) 03:33:51 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@deltaction={0x2c, 0x31, 0x301, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0x2c}}, 0x0) 03:33:51 executing program 2: keyctl$set_reqkey_keyring(0x6, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) [ 464.535315] netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. 03:33:51 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000000)) 03:33:51 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000340)=""/139) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x700, 0x0, @empty={[0xffb11b60, 0x900, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 03:33:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)=[{0xc}], 0xc}}], 0x2, 0x0) 03:33:52 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f0000000000)) 03:33:52 executing program 4: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='cUildren\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:52 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000340)=""/139) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x700, 0x0, @empty={[0xffb11b60, 0x900, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 03:33:52 executing program 3: mlockall(0x4) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f000068cffc)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080)=0x9, 0x4) connect$inet(r1, &(0x7f0000000040), 0x10) setsockopt$sock_int(r1, 0x1, 0x80000000009, &(0x7f0000f0fffc)=0x77a, 0x4) 03:33:52 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) membarrier(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) creat(&(0x7f0000000380)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x10) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000640)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5, 0x0, [{0x0, 0xffffffffffffffd9}]}}) 03:33:52 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000340)=""/139) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x700, 0x0, @empty={[0xffb11b60, 0x900, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 03:33:53 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) getuid() getresuid(&(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) geteuid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) lstat(&(0x7f0000000ec0)='./file1\x00', &(0x7f0000000f00)) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000f80), 0x24, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0xffffffffffffffff) add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000008c0), &(0x7f0000000900), 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000980)='pkcs7_test\x00', &(0x7f00000009c0), 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000840)='\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000380)=@ethernet={0x0, @dev}, &(0x7f0000000400)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0x452) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000640)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:53 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000340)=""/139) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x700, 0x0, @empty={[0xffb11b60, 0x900, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 03:33:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000180)=[{{0x77359400}, 0x14, 0x7f}], 0x18) 03:33:53 executing program 4: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='cUildren\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) sysfs$2(0x2, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:53 executing program 3: mlockall(0x4) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000009fc8)={&(0x7f00000001c0), 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x1c, 0x1c, 0x401, 0x0, 0x0, {0x40007}, [@generic="ee216c1254"]}, 0x1c}}, 0x0) 03:33:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) gettid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) fcntl$getown(0xffffffffffffffff, 0x9) gettid() getpgrp(0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000500)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000600)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000140)='vlan0\x00') sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @broadcast}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'bond_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@mcast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40)={@remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000010c0)={@rand_addr, @multicast1}, &(0x7f0000001100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001240)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001400)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000580), 0xc, &(0x7f0000001900)={&(0x7f0000001440)=ANY=[]}}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getpid() accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000003c0), 0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000004c0)) getresgid(&(0x7f0000000180), &(0x7f0000000340), &(0x7f0000000380)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000680)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) 03:33:53 executing program 5: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") semget$private(0x0, 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000a00)={0x10}, 0x10) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_emit_ethernet(0x1e, &(0x7f0000000900)={@random="6f2f52b5955c", @dev, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "f7e94283bd4f0d88"}}}}, 0x0) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000780)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000800)=""/207, 0xcf) pipe(&(0x7f0000000040)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) geteuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) 03:33:53 executing program 2: io_setup(0x6, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000002dc0)=0xe8) lstat(&(0x7f0000002e00)='./file0/../file0\x00', &(0x7f0000002e40)) chown(&(0x7f0000002c80)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0), 0x14) creat(&(0x7f0000000040)='./file0\x00', 0x0) memfd_create(&(0x7f0000000380)='\'selinuxGPLppp0.lo@selinux\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000340)=@known='trusted.overlay.origin\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000240)=0x396) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)}) write$evdev(0xffffffffffffffff, &(0x7f0000000080), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f00000005c0)}, 0x10) 03:33:54 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) pipe(&(0x7f0000000180)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000, 0x0, &(0x7f0000001280), 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:33:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0xcf2) read(r0, &(0x7f00000000c0), 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) unlink(&(0x7f0000000280)='./file0/file0\x00') 03:33:54 executing program 3: mlockall(0x4) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:54 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup2(r0, r0) connect$bt_l2cap(r1, &(0x7f00000006c0), 0xe) 03:33:54 executing program 5: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") semget$private(0x0, 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000a00)={0x10}, 0x10) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_emit_ethernet(0x1e, &(0x7f0000000900)={@random="6f2f52b5955c", @dev, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "f7e94283bd4f0d88"}}}}, 0x0) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000780)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000800)=""/207, 0xcf) pipe(&(0x7f0000000040)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) geteuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) 03:33:54 executing program 0: getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) epoll_create1(0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000004c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/5, 0x5) getrlimit(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000240)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rt_sigpending(&(0x7f0000000480), 0x8) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000002c0)=0x6e) syz_execute_func(&(0x7f0000000540)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c4060f38211a6464660f38dbd30feefee5e55b75455d9c0404726363009ec4034568c8c8a6a3b786e2b3673640dfc2c48366410f3a15c3576d0500") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0) 03:33:54 executing program 2: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpeername(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000580)) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000005c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x0, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/urandom\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$loop(&(0x7f00000008c0)='/dev/loop#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900), 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)={&(0x7f0000000940)='./file0\x00'}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a00)='cgroup.subtree_control\x00', 0x2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000a40)={0xa, 0x0, 0x0, @local}, &(0x7f0000000a80)=0x1c) inotify_init() socket$nl_generic(0x10, 0x3, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/urandom\x00', 0x0, 0x0) getpgid(0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000d40)=0xe8) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000001180)=ANY=[]}, 0x0) 03:33:55 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0xa, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000000), 0xffffffffffffffa5}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000340)=&(0x7f0000000040)) r5 = dup3(r2, 0xffffffffffffff9c, 0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r6, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x22a}, &(0x7f0000000280)=0xf7f5dfd5427e8bb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x10000}, &(0x7f0000000300)=0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r5}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f00000005c0)={0x100, 0x0, 0x3, 'queue1\x00', 0x80}) mbind(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000680)=0x1, 0xfff, 0x6) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:33:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r2, r1, 0x0, 0x4, &(0x7f0000000600)="5e506cfe"}, 0x11) 03:33:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000000200)={@link_local, @empty, [], {@can={0xc, {{0x1, 0xff}, 0x8, 0x2, 0x0, 0x0, "a0d63a13c3b02e5b"}}}}, &(0x7f0000000280)={0x0, 0x2, [0xcd0]}) 03:33:55 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0xa, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000000), 0xffffffffffffffa5}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000340)=&(0x7f0000000040)) r5 = dup3(r2, 0xffffffffffffff9c, 0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r6, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x22a}, &(0x7f0000000280)=0xf7f5dfd5427e8bb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x10000}, &(0x7f0000000300)=0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r5}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f00000005c0)={0x100, 0x0, 0x3, 'queue1\x00', 0x80}) mbind(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000680)=0x1, 0xfff, 0x6) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:33:55 executing program 3: mlockall(0x4) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:55 executing program 5: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") semget$private(0x0, 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000a00)={0x10}, 0x10) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_emit_ethernet(0x1e, &(0x7f0000000900)={@random="6f2f52b5955c", @dev, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "f7e94283bd4f0d88"}}}}, 0x0) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000780)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000800)=""/207, 0xcf) pipe(&(0x7f0000000040)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) geteuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) 03:33:55 executing program 4: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/126) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 03:33:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000040), 0x6) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:33:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 03:33:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 03:33:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 03:33:56 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0xa, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000000), 0xffffffffffffffa5}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000340)=&(0x7f0000000040)) r5 = dup3(r2, 0xffffffffffffff9c, 0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r6, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x22a}, &(0x7f0000000280)=0xf7f5dfd5427e8bb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x10000}, &(0x7f0000000300)=0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r5}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f00000005c0)={0x100, 0x0, 0x3, 'queue1\x00', 0x80}) mbind(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000680)=0x1, 0xfff, 0x6) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:33:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 03:33:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:56 executing program 5: sysinfo(&(0x7f0000000940)=""/100) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$revoke(0x3, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") semget$private(0x0, 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000a00)={0x10}, 0x10) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_emit_ethernet(0x1e, &(0x7f0000000900)={@random="6f2f52b5955c", @dev, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "f7e94283bd4f0d88"}}}}, 0x0) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000780)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000800)=""/207, 0xcf) pipe(&(0x7f0000000040)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) geteuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) 03:33:56 executing program 3: clock_gettime(0x1, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:56 executing program 4: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/126) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:56 executing program 0: clock_gettime(0xfffffffffffffffe, &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000005c0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) 03:33:56 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0xa, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000000), 0xffffffffffffffa5}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000340)=&(0x7f0000000040)) r5 = dup3(r2, 0xffffffffffffff9c, 0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r6, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x22a}, &(0x7f0000000280)=0xf7f5dfd5427e8bb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x10000}, &(0x7f0000000300)=0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r5}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f00000005c0)={0x100, 0x0, 0x3, 'queue1\x00', 0x80}) mbind(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000680)=0x1, 0xfff, 0x6) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x39044, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:33:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:57 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff8000/0x2000)=nil, 0x2000}, 0x1}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) 03:33:57 executing program 4: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/126) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:57 executing program 5: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 03:33:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x40000073, 0x0, 0x11e]}) 03:33:57 executing program 0: clock_gettime(0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000001b00)="42568055a07a7a69ef69dc00d990c866473aee7142c9c937d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e2edfbf7c000000011a011a64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) io_setup(0x0, &(0x7f0000000400)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f00000007c0)) [ 470.530142] kvm [14391]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 03:33:58 executing program 3: syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@wsync='wsync'}, {@noalign='noalign'}]}) 03:33:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) [ 470.951812] XFS (loop3): Invalid superblock magic number 03:33:58 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') prctl$setname(0xf, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) 03:33:58 executing program 4: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/126) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:58 executing program 5: keyctl$set_reqkey_keyring(0x13, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:58 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getresuid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) 03:33:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x943}}}, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x2, 0xffff, r0}, &(0x7f0000000280)=0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 03:33:59 executing program 4: setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000040)={{0x77359400}}, &(0x7f0000000340)) recvmsg(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000007c0)=""/198, 0xc6}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)=""/99, &(0x7f0000000500)=0x63) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='net/connector\x00') setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440), 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000200)={'icmp\x00'}, &(0x7f0000000240)=0x1e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:59 executing program 3: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000400)) lstat(&(0x7f00000006c0)='./file1\x00', &(0x7f00000007c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000480)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:59 executing program 5: keyctl$set_reqkey_keyring(0x13, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:59 executing program 2: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='/proc/self/net/pfkey\x00'}, 0xfffffffffffffda8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:59 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getresuid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) 03:33:59 executing program 1: socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000300)=""/79, 0x4f) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 03:34:00 executing program 1: socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000300)=""/79, 0x4f) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 03:34:00 executing program 1: socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000300)=""/79, 0x4f) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 03:34:00 executing program 4: clock_gettime(0x1, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:00 executing program 1: socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000300)=""/79, 0x4f) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 03:34:00 executing program 3: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000400)) lstat(&(0x7f00000006c0)='./file1\x00', &(0x7f00000007c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000480)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:00 executing program 5: keyctl$set_reqkey_keyring(0x13, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:00 executing program 2: clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipddp0\x00', &(0x7f0000000400)=@ethtool_perm_addr}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000004c0)) mount(&(0x7f00000012c0), &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") geteuid() ptrace$peekuser(0x3, 0x0, 0x0) 03:34:00 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getresuid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) 03:34:00 executing program 1: sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f00000000c0)={0x20}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000180)={0x20}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000380)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003100)={'bridge_slave_1\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000006e40)={&(0x7f00000004c0)=@setlink={0x20}, 0x20}}, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 473.652253] devpts: called with bogus options 03:34:01 executing program 3: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000400)) lstat(&(0x7f00000006c0)='./file1\x00', &(0x7f00000007c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000480)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r1) 03:34:01 executing program 5: keyctl$set_reqkey_keyring(0x13, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:01 executing program 2: socketpair$unix(0x1, 0x805, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000580)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000038c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000c40)=""/167, 0xa7}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31114, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) 03:34:01 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004440), &(0x7f0000004480)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004600)) fstat(0xffffffffffffffff, &(0x7f0000004680)) getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getresuid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) 03:34:01 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[], 0xffffffffffffff65}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a030000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x70}}, 0x0) r3 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0xa000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000005c0)=0x7) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r4, 0x58, "f46d40", "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"}}, 0x110) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) setuid(r0) sendmmsg(r2, &(0x7f0000000180), 0x0, 0x1) 03:34:01 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'lo\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syz_tun\x00'}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000680)='/dev/zero\x00', 0x400100, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000003300)=ANY=[], 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000001c0)={0x2, 'nr0\x00'}, 0x18) [ 474.702432] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 474.703639] IPVS: stopping backup sync thread 14557 ... 03:34:02 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[], 0xffffffffffffff65}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a030000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x70}}, 0x0) r3 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0xa000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000005c0)=0x7) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r4, 0x58, "f46d40", "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"}}, 0x110) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) setuid(r0) sendmmsg(r2, &(0x7f0000000180), 0x0, 0x1) 03:34:02 executing program 1: set_tid_address(&(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='yeah\x00', 0x5) socket$netlink(0x10, 0xffffffe0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_init1(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000400)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000900), 0xc, &(0x7f0000000a40)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 03:34:02 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[], 0xffffffffffffff65}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a030000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x70}}, 0x0) r3 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0xa000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000005c0)=0x7) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r4, 0x58, "f46d40", "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"}}, 0x110) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) setuid(r0) sendmmsg(r2, &(0x7f0000000180), 0x0, 0x1) 03:34:02 executing program 3: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000400)) lstat(&(0x7f00000006c0)='./file1\x00', &(0x7f00000007c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000480)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:02 executing program 5: keyctl$unlink(0x9, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x200005c0, 0x0, 0x0, 0x20000698, 0x200006c8], 0x0, &(0x7f0000000180), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x0, 0x0, 'yam0\x00', 'teql0\x00', 'bridge_slave_1\x00', 'bond0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1b0) set_robust_list(&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 03:34:02 executing program 2: prctl$setname(0x1d, &(0x7f0000000380)="642b03000000a65edb0000") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000340), &(0x7f00000003c0)=0x4) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000480)=""/123, 0x7b, 0x0, &(0x7f0000000500)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") 03:34:02 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[], 0xffffffffffffff65}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a030000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x70}}, 0x0) r3 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0xa000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000005c0)=0x7) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r4, 0x58, "f46d40", "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"}}, 0x110) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) setuid(r0) sendmmsg(r2, &(0x7f0000000180), 0x0, 0x1) [ 475.253542] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed [ 475.302876] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 03:34:02 executing program 0: keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000200)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000280)=0xc078ce98) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0xab, 0xfffffffffffffffe) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) seccomp(0x0, 0x0, &(0x7f0000000240)) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:02 executing program 4: accept$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) pwritev(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000000280)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f00000002c0)=0x8) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:02 executing program 5: keyctl$unlink(0x9, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x200005c0, 0x0, 0x0, 0x20000698, 0x200006c8], 0x0, &(0x7f0000000180), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x0, 0x0, 'yam0\x00', 'teql0\x00', 'bridge_slave_1\x00', 'bond0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1b0) set_robust_list(&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 03:34:02 executing program 5: keyctl$unlink(0x9, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x200005c0, 0x0, 0x0, 0x20000698, 0x200006c8], 0x0, &(0x7f0000000180), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x0, 0x0, 'yam0\x00', 'teql0\x00', 'bridge_slave_1\x00', 'bond0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1b0) set_robust_list(&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 475.545905] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 03:34:03 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) [ 475.686522] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 03:34:03 executing program 5: keyctl$unlink(0x9, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x200005c0, 0x0, 0x0, 0x20000698, 0x200006c8], 0x0, &(0x7f0000000180), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x0, 0x0, 'yam0\x00', 'teql0\x00', 'bridge_slave_1\x00', 'bond0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1b0) set_robust_list(&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 475.881591] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 03:34:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt(r0, 0xff, 0x0, &(0x7f0000000180), 0x0) 03:34:03 executing program 5: prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:34:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt(r0, 0xff, 0x0, &(0x7f0000000180), 0x0) 03:34:03 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000100)) timer_create(0x0, 0xffffffffffffffff, &(0x7f0000000400)) 03:34:03 executing program 2: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$session_to_parent(0x12) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000980)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000080)) getitimer(0x0, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) acct(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sysfs$3(0x3) pipe(&(0x7f0000000540)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380), 0x10, &(0x7f0000000440)={&(0x7f00000003c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "62cbcd2573b39f4b"}, 0x10}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000240)) 03:34:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt(r0, 0xff, 0x0, &(0x7f0000000180), 0x0) 03:34:03 executing program 3: sysfs$2(0x2, 0x7, &(0x7f00000001c0)=""/182) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x0) clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[], &(0x7f0000000780)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000007c0), 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) [ 476.366227] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:34:03 executing program 4: syslog(0xa, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getuid() getgroups(0x0, &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c40)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000d40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d80)) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001180)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001280)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt(r0, 0xff, 0x0, &(0x7f0000000180), 0x0) 03:34:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 03:34:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') getdents64(r1, &(0x7f0000000400)=""/116, 0x74) 03:34:03 executing program 2: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'syz_tun\x00', @ifru_hwaddr}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) getpid() memfd_create(&(0x7f0000000140)='/dev/zero\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='statm\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) exit(0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:34:04 executing program 1: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4033, 0x0, @local, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 03:34:04 executing program 5: r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x50) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x71, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 03:34:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="0200a9ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:34:04 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 477.053369] loop0: p1 [ 477.056285] loop0: partition table partially beyond EOD, truncated [ 477.088089] loop0: p1 start 1 is beyond EOD, truncated 03:34:04 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:04 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x220084, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f00000001c0)=0x8000, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x6, 0x4) [ 477.202245] loop0: p1 [ 477.204997] loop0: partition table partially beyond EOD, truncated [ 477.227412] loop0: p1 start 1 is beyond EOD, truncated 03:34:04 executing program 4: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000700)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000680)) getgid() add_key(&(0x7f0000000600)='rxrpc_s\x00', &(0x7f0000000640), &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000640), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @local}, &(0x7f0000000700)=0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740), 0x10, &(0x7f0000000800)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 03:34:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x400000000000000) 03:34:04 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/urandom\x00', 0x8800, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r3, r4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) syz_open_dev$sg(&(0x7f0000001680)='/dev/sg#\x00', 0x0, 0x0) r5 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000001640)=0xffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 03:34:05 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x8000}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x4}) fcntl$lock(r0, 0x7, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x6}) 03:34:05 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@loopback}, 0x14) creat(&(0x7f0000000540)='./file0/file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 03:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f00000001c0)=0x8000, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x6, 0x4) 03:34:05 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000540)}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000700)='/dev/adsp#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000004c0), &(0x7f0000000500)=0x8) socket$nl_crypto(0x10, 0x3, 0x15) timerfd_create(0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000740)=""/4096) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)) migrate_pages(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 03:34:05 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/urandom\x00', 0x8800, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r3, r4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) syz_open_dev$sg(&(0x7f0000001680)='/dev/sg#\x00', 0x0, 0x0) r5 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000001640)=0xffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 03:34:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000180)="2957e1311f16f477671070") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=[{0x10}], 0x10}}], 0x2, 0x0) [ 478.142038] minix_free_inode: bit 1 already cleared 03:34:05 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:34:05 executing program 3: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0xe8) getgroups(0x0, &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001000)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002bc0), &(0x7f0000002c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002cc0)='#\\\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgid() getpgid(0xffffffffffffffff) geteuid() getgroups(0x0, &(0x7f0000002e00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e80), &(0x7f0000002ec0)=0xc) getegid() getpid() lstat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003640)) getuid() stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003740)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003780), &(0x7f00000037c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003840)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000003800)='rxrpc\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003880)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000039c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f00000001c0)=0x8000, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x6, 0x4) 03:34:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x101) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x40}}, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000000c0)=0x1) 03:34:06 executing program 1: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) sendto$inet(r0, &(0x7f00000002c0)="ce", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) sendto$inet(r0, &(0x7f00000003c0), 0xfffffdef, 0x1f4, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 03:34:06 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/urandom\x00', 0x8800, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r3, r4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) syz_open_dev$sg(&(0x7f0000001680)='/dev/sg#\x00', 0x0, 0x0) r5 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000001640)=0xffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 03:34:06 executing program 4: timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000540)=@can, 0x80, &(0x7f0000001800), 0x0, &(0x7f0000001880)=""/138, 0x8a}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x0, 0x3, &(0x7f0000000240), &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000340)}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) [ 478.774655] minix_free_inode: bit 1 already cleared 03:34:06 executing program 1: sysfs$1(0x3, &(0x7f00000000c0)='trusted.overlay.upper\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000500)=0x100) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000540), 0x84) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001440)=@xdp, &(0x7f00000014c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000016c0)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001740)={@multicast2, @dev}, &(0x7f0000001780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast2}, &(0x7f0000000c40)=0xe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004100)={0x0, @dev}, &(0x7f0000004140)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000006100), 0x0, 0x0, &(0x7f0000006200)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006240)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006280)={'team0\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000063c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006440)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000064c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006580)={'vcan0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006bc0)={&(0x7f0000000140), 0xc, &(0x7f0000006b80)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000300)=0x10) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000980)=ANY=[]) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x90) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x4b, &(0x7f00000007c0)=""/75}, &(0x7f0000000140), &(0x7f0000000840)=""/184, 0x0, 0x0, 0x0, &(0x7f0000000200)}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0, &(0x7f0000001c40)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001ec0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005480), &(0x7f0000000c80)=0xa8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'veth0_to_bond\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005540)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000005640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast2}, &(0x7f0000001280)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000005800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005880)={@rand_addr, @rand_addr}, &(0x7f00000058c0)=0xc) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f00000001c0)=0x8000, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x6, 0x4) 03:34:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40406301}], 0x0, 0x0, &(0x7f0000002000)}) [ 479.159101] binder: 14808:14809 ioctl c0306201 20007000 returned -14 03:34:06 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000001180)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) pipe2(&(0x7f0000000800), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000c00)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000ac0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000500)=0xc) geteuid() gettid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='rdma.current\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffff9c, 0x10, &(0x7f0000000bc0)={&(0x7f0000000b40)=""/97, 0x61, 0xffffffffffffffff}}, 0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) modify_ldt$write(0x1, &(0x7f0000000380), 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000780)=""/125, 0x7d, 0x0, &(0x7f0000000a00)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f00000008c0)="26656436660f2a3e8055a07a7a69ef69dc00d990c841ff0f185c38d4c4022d9b65fec19086d9f28fc9e5e543ddce2b74742e1a1ac4415d71d40031a3b786e2987f") [ 479.236075] binder: 14808:14813 ioctl c0306201 20007000 returned -14 03:34:06 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/urandom\x00', 0x8800, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r3, r4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x4) syz_open_dev$sg(&(0x7f0000001680)='/dev/sg#\x00', 0x0, 0x0) r5 = shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(r5, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000001640)=0xffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f135d", 0x13, 0x400}], 0x0, 0x0) 03:34:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) 03:34:06 executing program 0: sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/47) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 479.392011] minix_free_inode: bit 1 already cleared 03:34:06 executing program 5: keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) [ 480.108470] minix_free_inode: bit 1 already cleared 03:34:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') fremovexattr(r0, &(0x7f0000001640)=@known='security.ima\x00') 03:34:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:07 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:08 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000300)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000003c0)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) getresuid(&(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000400)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000018c0)) setresuid(0x0, 0x0, 0x0) request_key(&(0x7f0000000500)='cifs.idmap\x00', &(0x7f00000005c0), &(0x7f0000000600)='*\x00', 0xffffffffffffffff) add_key(&(0x7f0000000640)='cifs.idmap\x00', &(0x7f0000000180), &(0x7f00000006c0), 0x0, 0xffffffffffffffff) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) request_key(&(0x7f0000000740)='rxrpc_s\x00', &(0x7f0000000780), &(0x7f00000007c0)='children\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000800), &(0x7f0000000840)=""/4096, 0x1000, &(0x7f0000001880)={&(0x7f0000001840)={'cbcmac(des)\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:08 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000780)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001c80)=0xe8) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000002000)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002080)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@loopback}}, &(0x7f0000002180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000021c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getegid() getpgid(0x0) stat(&(0x7f0000002300)='./file1\x00', &(0x7f0000002340)) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002500)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002600)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002700)) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getgroups(0x0, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:08 executing program 0: mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000), 0x10) 03:34:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:08 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:08 executing program 0: keyctl$dh_compute(0x13, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000000)={0xb}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="0f0103f26d67f2f7320fc79b000000000f01cbc4c23dab8b0a000000f2a3381dd45266baf80cb8bcbd3f80ef66bafc0cb803000000ef0f239df20f5a5b00", 0x3e}], 0xaaaacd8, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa2}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 03:34:09 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:09 executing program 1: prctl$seccomp(0x2a, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000640)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000004ec0)=0xe8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@getqdisc={0x28, 0x26, 0x401, 0x70bd25, 0x25dfdbfc, {0x0, r10, {0xffe7, 0x11}, {0x0, 0xfff3}, {0xffff, 0xffff}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:34:09 executing program 2: memfd_create(&(0x7f00000008c0)="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", 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000a80)) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000006c0), &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000a40), 0x8) syz_emit_ethernet(0x42, &(0x7f0000000640)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @remote, @remote, @empty, @mcast2}}}}, &(0x7f0000000500)) 03:34:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 03:34:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 03:34:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 03:34:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000940)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r2, 0x4) socketpair(0xf, 0x80807, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r3}, 0x10) r5 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00\x00') r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f0000000a00)='./file0\x00', r9}, 0x35) socketpair(0x7, 0xa, 0x4b, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x7fff) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r9}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000300)={r1, r0}) gettid() 03:34:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 03:34:10 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000680)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) accept4$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14, 0x0) getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@dev, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, 0xe8) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioprio_set$pid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000280)={0xb}, 0xb) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) getpriority(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1ffffffffffffedd, &(0x7f0000000280)}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:10 executing program 5: clock_gettime(0x6, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000240)={{0x77359400}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:34:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f46"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:10 executing program 3: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') setrlimit(0x0, &(0x7f0000000240)) 03:34:10 executing program 2: memfd_create(&(0x7f00000008c0)="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", 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000a80)) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000006c0), &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000a40), 0x8) syz_emit_ethernet(0x42, &(0x7f0000000640)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @remote, @remote, @empty, @mcast2}}}}, &(0x7f0000000500)) 03:34:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x20, 0x4) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, &(0x7f00000010c0), &(0x7f0000000000)=0x60) 03:34:10 executing program 0: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa37b90f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") 03:34:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/20}, 0x18) 03:34:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="951813c2cf80b7df9432cfd99090edb19cd1b1ffa800000000", 0x19) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r1, &(0x7f0000e76000)="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", 0x5a5, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) 03:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000300), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) clock_getres(0x0, &(0x7f0000000240)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x4) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getegid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d23502306470f953efa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:11 executing program 2: memfd_create(&(0x7f00000008c0)="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", 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000a80)) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000006c0), &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000a40), 0x8) syz_emit_ethernet(0x42, &(0x7f0000000640)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @remote, @remote, @empty, @mcast2}}}}, &(0x7f0000000500)) 03:34:11 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0xa58, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c40], 0x0, &(0x7f0000000300), &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}, 0xad0) 03:34:11 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000980)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 03:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/xfrm_stat\x00') 03:34:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000340)=""/76) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000180), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) close(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000280)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000500)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0xff7d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:11 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) clock_gettime(0x0, &(0x7f0000004cc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004ac0), 0x0, 0x0, &(0x7f0000004d00)) recvmmsg(0xffffffffffffffff, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000005fc0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006000)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000006100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@remote}}, &(0x7f0000006240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006280)={{{@in6, @in6=@loopback}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000063c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006400)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in=@broadcast, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006740)={@local}, &(0x7f0000006780)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000067c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006800)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008480)={@mcast1}, &(0x7f00000084c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000085c0)={{{@in=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f00000086c0)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000008700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008c40)={&(0x7f0000000280), 0xc, &(0x7f0000008c00)={&(0x7f0000008780)={0x14}, 0x14}}, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) [ 484.744384] audit: type=1326 audit(2000000052.058:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15065 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:12 executing program 2: memfd_create(&(0x7f00000008c0)="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", 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000a80)) syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000006c0), &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000a40), 0x8) syz_emit_ethernet(0x42, &(0x7f0000000640)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @remote, @remote, @empty, @mcast2}}}}, &(0x7f0000000500)) 03:34:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 485.431914] cgroup: fork rejected by pids controller in /syz5 [ 485.452006] audit: type=1326 audit(2000000052.768:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15065 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000d55000), 0xc, &(0x7f00008b7ff0)={&(0x7f0000bfdfdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0x2}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 03:34:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:13 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000180)=ANY=[]}}], 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:34:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 485.747251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:34:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:13 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @local, @local}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@broadcast, @broadcast}, 0xc) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240), 0x8) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@delqdisc={0x24}, 0x24}}, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000001c0)='erspan0\x00') syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") clock_gettime(0x0, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000440)="0001000000ff000000000000c9030000ec00000001000800000011cc0a56d4a9a75900000020000000010000000000006e5fbe5c0000ffff53ef0100010000006e5fbe5a0000c9ca68e30d69e5000000000000010000000000800000002c00000000000088", 0x65, 0x400}], 0x8000, &(0x7f0000000000)) [ 485.979266] EXT4-fs (loop0): couldn't mount RDWR because of unsupported optional features (80) [ 486.032225] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities [ 486.157621] EXT4-fs (loop0): couldn't mount RDWR because of unsupported optional features (80) 03:34:13 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) 03:34:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r3, 0xfff, 0x2, r2}) [ 486.202193] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities 03:34:13 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x60280, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000300), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000480), &(0x7f0000000200)=0x8) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) 03:34:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) clock_adjtime(0xa000000, &(0x7f0000000240)) 03:34:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) sendmsg$rds(r4, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)}, 0x0) close(r4) 03:34:13 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) gettid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) 03:34:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x1c) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@rc, 0x2c3, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/98, 0x62}, 0x0) 03:34:13 executing program 5: clock_getres(0x5, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in, @in6=@mcast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") [ 486.548902] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:34:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) sendmsg$rds(r4, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)}, 0x0) close(r4) [ 486.590957] net_ratelimit: 4 callbacks suppressed [ 486.590981] sock: sock_set_timeout: `syz-executor4' (pid 15185) tries to set negative timeout 03:34:14 executing program 5: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") pipe2(&(0x7f00000000c0), 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 03:34:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) 03:34:14 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) gettid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) 03:34:14 executing program 4: r0 = memfd_create(&(0x7f0000000140)="885d292b00eb2e2c8a38bd397981f32b9b12146590efc0bf1a30a5ee23d2593229fc839f4bc87d87a74f9408e25f3e480fbdd92a54ce", 0x0) write(r0, &(0x7f0000000080)=')', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0xa00002) sendfile(r0, r0, &(0x7f0000000040), 0xff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) sendmsg$rds(r4, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)}, 0x0) close(r4) [ 487.277640] netlink: 'syz-executor1': attribute type 16 has an invalid length. 03:34:14 executing program 2: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000580)="42805da00fef69dc0f01ee26a8d8c40191d58a000000009eeaeaacc041cbcb3e3636a72900770f789958ea2350887f0606eafa6b2179660f38302f66470f73f70a8af5c44379dfb9d6adbe90dfe298c4a17ee6127e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@mcast2}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'veth0_to_bond\x00'}) clock_gettime(0x0, &(0x7f0000007b40)) recvmmsg(0xffffffffffffffff, &(0x7f0000007a00), 0x0, 0x0, &(0x7f0000007b80)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007c00)={@loopback, @loopback}, &(0x7f0000007c40)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@ipv4={[], [], @multicast1}}, &(0x7f0000007cc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007d80)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000007e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007ec0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007f00)={0x0, @empty, @multicast1}, &(0x7f0000007f40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000007f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008000)={@dev}, &(0x7f0000008040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008080)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000008180)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000081c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008200)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008240)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000008340)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000008440)=@xdp, &(0x7f00000084c0)=0x80, 0x0) 03:34:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) sendmsg$rds(r4, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)}, 0x0) close(r4) 03:34:14 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x40045108, &(0x7f0000000140)={0xffffffff}) 03:34:14 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) gettid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) 03:34:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f0000000180)=[{r1}], 0x50, 0x0) 03:34:14 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000440)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:14 executing program 0: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getpid() geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in=@broadcast, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ec0)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000030c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000003200)=0xe8) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000003440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003480)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000003680), &(0x7f00000036c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) geteuid() stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003d80)) stat(&(0x7f0000003dc0)='./file0\x00', &(0x7f0000003e00)) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() stat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004140)=0xe8) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004440)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000004480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b80)={{{@in=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004c80)=0xe8) stat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) 03:34:15 executing program 5: clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:15 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'vcan0\x00'}) gettid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) 03:34:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvfrom(r0, &(0x7f0000000480)=""/85, 0x55, 0x10001, &(0x7f0000000500)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80) 03:34:15 executing program 4: migrate_pages(0x0, 0x2, &(0x7f0000001340), &(0x7f0000000140)=0x1) gettid() creat(&(0x7f00000016c0)='./file0\x00', 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000001700)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001380)=ANY=[], &(0x7f0000001300)) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) getrlimit(0x0, &(0x7f0000000180)) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0xc) lsetxattr$trusted_overlay_redirect(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.redirect\x00', &(0x7f0000001540)='./file0\x00', 0x8, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000015c0)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001280), 0xfffffffffffffe19) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$can_raw(0x1d, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001f3a), 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, &(0x7f0000e4b000)) io_submit(0x0, 0x0, &(0x7f0000bd9fe0)) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001780)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f0000001880)=0x100) bind(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback}, 0xf) syz_execute_func(&(0x7f0000001400)="428055a0636969ef69dc00d9c421a05d2f8a20c463216c6fab00c3f6cf000fcdae300f3821c4234d5cf0cbc07f41dfe0400f01efe5e5430f401ae400001a1a01460f01ee45dfde9f") 03:34:15 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000200)="441f3708e30700000000840e00fe36ce73e20700000000000000db5851", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)=""/37, &(0x7f0000000040)=0x25) 03:34:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x1, {0x77359400}, 0x6}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x0, &(0x7f0000000080), 0x0) getpid() ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000640)={0x3, 0x0, [{}, {}, {}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000080)="0f0626360f0136996d66b8010000000f23d80f21f86635000000a00f23f80f01ca66b9800000c00f326635000400000f30656726f2af65f4650f01caf40f6a2e0000", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000540)={0xd0003}) perf_event_open(&(0x7f00000002c0)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) 03:34:15 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:15 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x20000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000600)=0x1c) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:15 executing program 5: clock_getres(0x8, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0)}}, 0x18) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[]}}, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000200)) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 03:34:16 executing program 4: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:16 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:16 executing program 2: syz_read_part_table(0x80200000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)='RDSK', 0x4}]) 03:34:16 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:16 executing program 5: r0 = memfd_create(&(0x7f0000000180)='rr\x00', 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 03:34:16 executing program 2: prctl$intptr(0x2f, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) 03:34:16 executing program 5: r0 = memfd_create(&(0x7f0000000180)='rr\x00', 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 03:34:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x70e000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) msgget(0xffffffffffffffff, 0x0) 03:34:16 executing program 5: r0 = memfd_create(&(0x7f0000000180)='rr\x00', 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 03:34:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e0000000020a17b3059fc2c28de66ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065"], 0x90) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) mount$fuseblk(&(0x7f00000002c0)="2f6465762f6c6f6f703004", &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x21, &(0x7f0000001600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], 0x3f000000}}) pread64(r0, &(0x7f0000001480)=""/185, 0xb9, 0x0) pread64(r0, &(0x7f0000001680)=""/212, 0xd4, 0x0) 03:34:17 executing program 5: r0 = memfd_create(&(0x7f0000000180)='rr\x00', 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 03:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x70e000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) msgget(0xffffffffffffffff, 0x0) 03:34:17 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000140)}, 0x10) 03:34:17 executing program 5: sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000023c0), 0x0, 0x0, &(0x7f0000002400)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @dev, @local}, &(0x7f0000002480)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002740)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@remote, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000002880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'bond_slave_1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002b00)={@local, @broadcast}, &(0x7f0000002b40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in6}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000003040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{{@in6=@mcast1, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000003180)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000032c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003340)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006a80), 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000006d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006dc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006e00), &(0x7f0000006e40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006f40)={0x0, @dev, @broadcast}, &(0x7f0000000540)=0x9) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000007580)={&(0x7f00000003c0), 0xc, &(0x7f0000007540)={&(0x7f0000006fc0)={0x14}, 0x14}}, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000001340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getuid() stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000d80)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:17 executing program 4: clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], &(0x7f00000004c0)=""/121, 0x79) socket$inet(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet0securityvboxnet0*vmnet0\\\'cpuseteth0\x00'}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000340)='./file1\x00'}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) close(0xffffffffffffffff) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/191, 0xbf) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000d80)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) 03:34:17 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000640)={'eql\x00', {0x2, 0x0, @multicast1}}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/58, 0x3a, 0x0, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) getuid() getgid() getpgrp(0x0) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f00000010c0)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@loopback, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) getgroups(0x0, &(0x7f0000001500)) accept(0xffffffffffffffff, &(0x7f0000001540)=@in={0x2, 0x0, @dev}, &(0x7f00000015c0)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000001640)=0xfffffffffffffebb) geteuid() getresgid(&(0x7f0000001680), &(0x7f00000016c0), &(0x7f0000001700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002000)) 03:34:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) 03:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x70e000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) msgget(0xffffffffffffffff, 0x0) 03:34:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e0000000020a17b3059fc2c28de66ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065"], 0x90) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) mount$fuseblk(&(0x7f00000002c0)="2f6465762f6c6f6f703004", &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x21, &(0x7f0000001600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], 0x3f000000}}) pread64(r0, &(0x7f0000001480)=""/185, 0xb9, 0x0) pread64(r0, &(0x7f0000001680)=""/212, 0xd4, 0x0) 03:34:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x70e000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) msgget(0xffffffffffffffff, 0x0) 03:34:18 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x1ff) 03:34:18 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x3, 0x5ef}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 03:34:18 executing program 2: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:34:18 executing program 4: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) gettid() geteuid() stat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c80)) fstat(0xffffffffffffffff, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004080)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) 03:34:18 executing program 0: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) memfd_create(&(0x7f00000002c0)='}\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x7f, 0x7d, 0x0, {{0x0, 0x6a, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, '{em1#%', 0x17, 'trusted.overlay.opaque\x00', 0x1a, 'cpuset.memory_spread_slab\x00'}}}, 0x7f) rt_sigprocmask(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) getpgid(0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000280)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@dev, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udp(0xa, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") 03:34:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e0000000020a17b3059fc2c28de66ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065"], 0x90) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) mount$fuseblk(&(0x7f00000002c0)="2f6465762f6c6f6f703004", &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x21, &(0x7f0000001600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], 0x3f000000}}) pread64(r0, &(0x7f0000001480)=""/185, 0xb9, 0x0) pread64(r0, &(0x7f0000001680)=""/212, 0xd4, 0x0) 03:34:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)}}, {{0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=[{0x10, 0x11, 0x67}], 0x10}}], 0x2, 0x0) 03:34:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x7, &(0x7f0000000180)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xdd, &(0x7f0000000240)=""/221}, 0x48) 03:34:19 executing program 2: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x24e, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000002c0)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0)={0x0, 0x1c9c380}) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040)={0x0, @local, 0x0, 0x0, 'sh\x00'}, 0x2c) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000280)=0xffffffffffffffeb) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) times(&(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@mcast2}) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) 03:34:20 executing program 3: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0xe) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff84}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 03:34:20 executing program 5: unshare(0x0) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e0000000020a17b3059fc2c28de66ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065"], 0x90) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) mount$fuseblk(&(0x7f00000002c0)="2f6465762f6c6f6f703004", &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x21, &(0x7f0000001600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], 0x3f000000}}) pread64(r0, &(0x7f0000001480)=""/185, 0xb9, 0x0) pread64(r0, &(0x7f0000001680)=""/212, 0xd4, 0x0) 03:34:20 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) [ 493.051332] IPVS: ftp: loaded support on port[0] = 21 03:34:21 executing program 4: prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000200)) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) 03:34:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) 03:34:21 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='\'\x00'}, 0x10) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000240)) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000200), 0x4) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0x237) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") 03:34:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f00000003c0)="2d444ac1209985b928c4c9b5bd2d3b3bdee461e2be5b3df51cfa239d5aecc3a2845bdee25394650db5d6e9311ab0086135406cc567be085dc42b7cf83904be242c09186675cee0742ab184e6d04e4c958291e99cd977deb7f91235dc6b05117855fec0b5404f1419aaff3164a6d2530e63bfdd8c22d2b53827a773ef2d4785eccd6c1db14bbdbd5abb8ad6c76bfdadce", 0x90) 03:34:21 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x7ffff, &(0x7f0000000000)={@local, @empty=[0x0, 0x8864000000000000], [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000040)) 03:34:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3309, &(0x7f0000000080)) 03:34:21 executing program 0: keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:21 executing program 3: prctl$intptr(0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast1}, @in=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@loopback, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000480)='./bus\x00', &(0x7f0000000980)) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000a00)) getresgid(&(0x7f0000000600), &(0x7f0000000a80), &(0x7f0000000ac0)) getgid() stat(&(0x7f0000000b00)='./bus\x00', &(0x7f0000000b40)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./bus\x00', &(0x7f0000000d00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000e40)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='syst=\v\x00\x00\x00\x00\x00\x00_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000f40)=ANY=[], 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) 03:34:21 executing program 1: personality(0xffffffffffffffff) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) pipe(&(0x7f0000000080)) getitimer(0x0, &(0x7f0000000600)) ustat(0x0, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/vga_arbiter\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 496.133540] device bridge_slave_1 left promiscuous mode [ 496.139091] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.147133] device bridge_slave_0 left promiscuous mode [ 496.154244] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.251848] team0 (unregistering): Port device team_slave_1 removed [ 498.263290] team0 (unregistering): Port device team_slave_0 removed [ 498.273854] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 498.285809] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 498.316555] bond0 (unregistering): Released all slaves [ 498.406843] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.415121] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.425575] device bridge_slave_0 entered promiscuous mode [ 498.484565] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.491036] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.499283] device bridge_slave_1 entered promiscuous mode [ 498.544023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 498.590892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 498.734581] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 498.783424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 499.003033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 499.010493] team0: Port device team_slave_0 added [ 499.056658] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 499.065118] team0: Port device team_slave_1 added [ 499.112487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 499.161708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 499.208832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 499.216471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.235199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.275684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 499.772882] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.779296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.786092] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.792532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.801484] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 500.361302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 500.749778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 500.841514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 500.933429] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 500.939564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 500.947538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 501.034775] 8021q: adding VLAN 0 to HW filter on device team0 03:34:29 executing program 5: keyctl$set_reqkey_keyring(0xd, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000980)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000880)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000900)) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getrusage(0x0, &(0x7f0000000480)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000700)={@loopback}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000540)) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "5802ed284662e1ce0e6e6d91e9ab2609a9ddfafc21e6139319d1dc634d95dfae29b9f7ed4b2fd955929529af41dfd234365d1b9c0d2fe9f96848414a1c68fe6f"}, 0x48}}, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000740)}) keyctl$update(0x2, 0x0, &(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:29 executing program 1: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000840), &(0x7f0000000880)='/dev/full\x00', 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:29 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000400)=""/55, 0x37}], 0x3, &(0x7f0000000540)=""/221, 0xdd, 0x100000001}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000740)=""/141, 0x8d}, {&(0x7f00000004c0)=""/5, 0x5}, {&(0x7f0000000bc0)=""/226, 0xe2}], 0x3, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/99, 0x63}], 0x1, &(0x7f0000001900)=""/1, 0x1}, 0x20}], 0x3, 0x100, &(0x7f0000002140)={0x0, 0x989680}) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:34:29 executing program 0: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/24) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:29 executing program 4: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) getgroups(0x0, &(0x7f0000003400)) getpid() getuid() getegid() ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 03:34:29 executing program 3: r0 = socket(0xa, 0x200000000080002, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000140), 0x0) 03:34:29 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) signalfd4(r0, &(0x7f0000000040)={0x7fffffff}, 0x8, 0x0) sendfile(r1, r2, &(0x7f00000001c0), 0x80000001) 03:34:29 executing program 3: socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/125, &(0x7f0000000300)=0x7d) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000040), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:30 executing program 2: unshare(0x8000000) shmget(0x2, 0x13000, 0x220, &(0x7f0000ab6000/0x13000)=nil) shmget(0x0, 0x3000, 0x7c000241, &(0x7f000029a000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0x0) unshare(0xc000000) [ 502.971101] ================================================================== [ 502.978744] BUG: KASAN: use-after-free in mqueue_get_tree+0x2ac/0x2e0 [ 502.985334] Read of size 8 at addr ffff8801b761de88 by task syz-executor2/15785 [ 502.992780] [ 502.994421] CPU: 0 PID: 15785 Comm: syz-executor2 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 503.002914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.012268] Call Trace: [ 503.014866] dump_stack+0x1d3/0x2c4 [ 503.018511] ? dump_stack_print_info.cold.2+0x52/0x52 [ 503.023706] ? printk+0xa7/0xcf [ 503.026986] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 503.031757] print_address_description.cold.8+0x9/0x1ff [ 503.037137] kasan_report.cold.9+0x242/0x309 [ 503.041548] ? mqueue_get_tree+0x2ac/0x2e0 [ 503.045790] __asan_report_load8_noabort+0x14/0x20 [ 503.050719] mqueue_get_tree+0x2ac/0x2e0 [ 503.054794] vfs_get_tree+0x1cb/0x5c0 [ 503.058609] mq_create_mount+0xe3/0x190 [ 503.062596] mq_init_ns+0x15a/0x210 [ 503.066226] copy_ipcs+0x3d2/0x580 [ 503.069779] ? ipcns_get+0xe0/0xe0 [ 503.073332] ? do_mount+0x1db0/0x1db0 [ 503.077135] ? kmem_cache_alloc+0x33a/0x730 [ 503.081469] create_new_namespaces+0x376/0x900 [ 503.086087] ? sys_ni_syscall+0x20/0x20 [ 503.090073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.095612] ? ns_capable_common+0x13f/0x170 [ 503.100116] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 503.105053] ksys_unshare+0x79c/0x10b0 [ 503.108944] ? kcov_ioctl+0x56/0x1f0 [ 503.112663] ? walk_process_tree+0x440/0x440 [ 503.117071] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 503.122274] ? __fget_light+0x2e9/0x430 [ 503.126250] ? fget_raw+0x20/0x20 [ 503.129703] ? graph_lock+0x170/0x170 [ 503.133512] ? finish_task_switch+0x1f5/0x900 [ 503.138012] ? _raw_spin_unlock_irq+0x27/0x80 [ 503.142518] ? do_syscall_64+0x9a/0x820 [ 503.146499] ? do_syscall_64+0x9a/0x820 [ 503.150475] ? lockdep_hardirqs_on+0x421/0x5c0 [ 503.155069] ? trace_hardirqs_on+0xbd/0x310 [ 503.159396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 503.164955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.170338] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 503.175794] ? ksys_ioctl+0x81/0xd0 [ 503.179438] __x64_sys_unshare+0x31/0x40 [ 503.183510] do_syscall_64+0x1b9/0x820 [ 503.187400] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.192766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 503.197702] ? trace_hardirqs_on_caller+0x310/0x310 [ 503.202728] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 503.207747] ? recalc_sigpending_tsk+0x180/0x180 [ 503.212508] ? kasan_check_write+0x14/0x20 [ 503.216749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.221603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.226797] RIP: 0033:0x4572d9 [ 503.229995] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.248897] RSP: 002b:00007fe47e7b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 503.256607] RAX: ffffffffffffffda RBX: 00007fe47e7b86d4 RCX: 00000000004572d9 [ 503.263873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000000 [ 503.271142] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 503.278406] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 503.285678] R13: 00000000004d7c40 R14: 00000000004caa82 R15: 0000000000000000 [ 503.292960] [ 503.294585] Allocated by task 13920: [ 503.298299] save_stack+0x43/0xd0 [ 503.301749] kasan_kmalloc+0xc7/0xe0 [ 503.305463] kasan_slab_alloc+0x12/0x20 [ 503.309435] kmem_cache_alloc+0x12e/0x730 [ 503.313585] skb_clone+0x1bb/0x500 [ 503.317125] ip_defrag+0x1e6a/0x4800 [ 503.320839] ipv4_conntrack_defrag+0x40e/0x580 [ 503.325422] nf_hook_slow+0xc2/0x1c0 [ 503.329137] ip_rcv+0x392/0x610 [ 503.332419] __netif_receive_skb_one_core+0x14d/0x200 [ 503.337623] __netif_receive_skb+0x2c/0x1e0 [ 503.341971] process_backlog+0x217/0x760 [ 503.346041] net_rx_action+0x7c5/0x1950 [ 503.350036] __do_softirq+0x30b/0xb03 [ 503.353826] [ 503.355448] Freed by task 9: [ 503.358470] save_stack+0x43/0xd0 [ 503.361928] __kasan_slab_free+0x102/0x150 [ 503.366161] kasan_slab_free+0xe/0x10 [ 503.369963] kmem_cache_free+0x83/0x290 [ 503.373938] kfree_skbmem+0x154/0x230 [ 503.377735] kfree_skb+0x1c3/0x580 [ 503.381275] skb_release_data+0x4af/0x880 [ 503.385434] skb_release_all+0x4a/0x60 [ 503.389328] kfree_skb+0x1bb/0x580 [ 503.392877] skb_release_data+0x4af/0x880 [ 503.397018] skb_release_all+0x4a/0x60 [ 503.400899] kfree_skb+0x1bb/0x580 [ 503.404441] ip_rcv_finish_core.isra.16+0xd1d/0x1f40 [ 503.409543] ip_rcv_finish+0xc6/0x300 [ 503.413346] ip_rcv+0xed/0x610 [ 503.416536] __netif_receive_skb_one_core+0x14d/0x200 [ 503.421736] __netif_receive_skb+0x2c/0x1e0 [ 503.426057] netif_receive_skb_internal+0x12c/0x620 [ 503.431076] napi_gro_receive+0x450/0x5f0 [ 503.435252] gro_cell_poll+0x132/0x210 [ 503.439138] net_rx_action+0x7c5/0x1950 [ 503.443112] __do_softirq+0x30b/0xb03 [ 503.447110] [ 503.448736] The buggy address belongs to the object at ffff8801b761de80 [ 503.448736] which belongs to the cache skbuff_head_cache of size 232 [ 503.461919] The buggy address is located 8 bytes inside of [ 503.461919] 232-byte region [ffff8801b761de80, ffff8801b761df68) [ 503.473618] The buggy address belongs to the page: [ 503.478551] page:ffffea0006dd8740 count:1 mapcount:0 mapping:ffff8801d9a04040 index:0xffff8801b761d5c0 [ 503.488009] flags: 0x2fffc0000000100(slab) [ 503.492260] raw: 02fffc0000000100 ffffea00075efc48 ffffea0007209e88 ffff8801d9a04040 [ 503.500147] raw: ffff8801b761d5c0 ffff8801b761d0c0 0000000100000003 0000000000000000 [ 503.508019] page dumped because: kasan: bad access detected [ 503.513717] [ 503.515336] Memory state around the buggy address: [ 503.520264] ffff8801b761dd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 503.527621] ffff8801b761de00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 503.534984] >ffff8801b761de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 503.542343] ^ [ 503.545970] ffff8801b761df00: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 503.553330] ffff8801b761df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 503.560679] ================================================================== [ 503.568027] Disabling lock debugging due to kernel taint [ 503.573688] Kernel panic - not syncing: panic_on_warn set ... [ 503.573688] [ 503.581064] CPU: 0 PID: 15785 Comm: syz-executor2 Tainted: G B 4.19.0-rc3-next-20180912+ #72 [ 503.590947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.600305] Call Trace: [ 503.602900] dump_stack+0x1d3/0x2c4 [ 503.606531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 503.611720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 503.616502] panic+0x238/0x4e7 [ 503.619694] ? add_taint.cold.5+0x16/0x16 [ 503.623849] ? trace_hardirqs_on+0xb4/0x310 [ 503.628167] ? trace_hardirqs_on+0xb4/0x310 [ 503.632494] kasan_end_report+0x47/0x4f [ 503.636464] kasan_report.cold.9+0x76/0x309 [ 503.640789] ? mqueue_get_tree+0x2ac/0x2e0 [ 503.645028] __asan_report_load8_noabort+0x14/0x20 [ 503.649953] mqueue_get_tree+0x2ac/0x2e0 [ 503.654015] vfs_get_tree+0x1cb/0x5c0 [ 503.657817] mq_create_mount+0xe3/0x190 [ 503.661793] mq_init_ns+0x15a/0x210 [ 503.665416] copy_ipcs+0x3d2/0x580 [ 503.668952] ? ipcns_get+0xe0/0xe0 [ 503.672496] ? do_mount+0x1db0/0x1db0 [ 503.676323] ? kmem_cache_alloc+0x33a/0x730 [ 503.680647] create_new_namespaces+0x376/0x900 [ 503.685233] ? sys_ni_syscall+0x20/0x20 [ 503.689207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.694745] ? ns_capable_common+0x13f/0x170 [ 503.699151] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 503.704086] ksys_unshare+0x79c/0x10b0 [ 503.707972] ? kcov_ioctl+0x56/0x1f0 [ 503.711691] ? walk_process_tree+0x440/0x440 [ 503.716092] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 503.721285] ? __fget_light+0x2e9/0x430 [ 503.725259] ? fget_raw+0x20/0x20 [ 503.728710] ? graph_lock+0x170/0x170 [ 503.732512] ? finish_task_switch+0x1f5/0x900 [ 503.737004] ? _raw_spin_unlock_irq+0x27/0x80 [ 503.741502] ? do_syscall_64+0x9a/0x820 [ 503.745491] ? do_syscall_64+0x9a/0x820 [ 503.749462] ? lockdep_hardirqs_on+0x421/0x5c0 [ 503.754059] ? trace_hardirqs_on+0xbd/0x310 [ 503.758383] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 503.763944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.769307] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 503.774757] ? ksys_ioctl+0x81/0xd0 [ 503.778384] __x64_sys_unshare+0x31/0x40 [ 503.782444] do_syscall_64+0x1b9/0x820 [ 503.786332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.791701] ? syscall_return_slowpath+0x5e0/0x5e0 [ 503.796631] ? trace_hardirqs_on_caller+0x310/0x310 [ 503.801646] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 503.806668] ? recalc_sigpending_tsk+0x180/0x180 [ 503.811422] ? kasan_check_write+0x14/0x20 [ 503.815654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.820516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.825699] RIP: 0033:0x4572d9 [ 503.828892] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.847786] RSP: 002b:00007fe47e7b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 503.855493] RAX: ffffffffffffffda RBX: 00007fe47e7b86d4 RCX: 00000000004572d9 [ 503.862760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000000 [ 503.870024] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 503.877286] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 503.884548] R13: 00000000004d7c40 R14: 00000000004caa82 R15: 0000000000000000 [ 503.892678] Kernel Offset: disabled [ 503.896296] Rebooting in 86400 seconds..