0x7f0000001280)=""/153, 0x99}], 0x7, &(0x7f00000013c0)=""/217, 0xd9, 0x7}, 0x7ff}, {{0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001500)=""/242, 0xf2, 0x100000001}, 0x40}], 0x3, 0x40, &(0x7f0000001600)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) r6 = getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, r6, 0x2, &(0x7f00000014c0)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="35b4bfa8f831d54c29b530d54e0dfa651d47b2ed9772dcd21d1540cdee652b7ae10ab6816c7aa22a8e5768a7deeb437b4f14964eb754ed67d889423184002e62594e65fa4f32e3f599ad7eae21abff065356c479b021d8cf60ff85fca3dcf5b1753ac75e9e899f7de6013e6c6cb090362443ad77f1a897d6816414fc427d2b7c74d1e9eb8ca1f268667d98279d1e189069e1c5acc5f273caa4de9e80e549b0d1eebe"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) accept$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000880)={@mcast2, 0x0}, &(0x7f00000008c0)=0x14) getpeername$packet(r4, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000940)=0x14) getpeername(r0, &(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a00)=0x80) getsockname$packet(r4, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getpeername$packet(r0, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e80)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000f80)={0x0, @loopback, @loopback}, &(0x7f0000000fc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001000)={'vcan0\x00', 0x0}) getpeername(r0, &(0x7f0000001040)=@ll={0x11, 0x0, 0x0}, &(0x7f00000010c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001700)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001880)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001900)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000001cc0)={@remote, 0x0}, &(0x7f0000001d00)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000024c0)={&(0x7f00000000c0), 0xc, &(0x7f0000002480)={&(0x7f0000002600)=ANY=[@ANYBLOB='\f\a\x00\x00', @ANYRES16=r5, @ANYBLOB="02052dbd7000fbdbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="4c02020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400cf00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff0700003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r11, @ANYBLOB="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", @ANYRES32=r12, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004004000000008000100", @ANYRES32=r13, @ANYBLOB="e001020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400018000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400001001030000000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400060000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000800000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000008000100", @ANYRES32=r18, @ANYBLOB="b801020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r21, @ANYBLOB="4c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400080061005308000008000007000000003f0005090100008038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004006e8500003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r22, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r23, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x70c}, 0x1, 0x0, 0x0, 0x80}, 0x20040001) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0x7fffffff, 0x800, 0x1, 0x2, 0x5, 0xea74, 0xeb, 0x7, 0x4, 0x80000000, 0x0, 0x8001, 0x1, 0x3, 0x8, 0x2}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:12 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000001c0)=0x8d) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:12 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x400000000000000, 0x0, 0xfffffffffffffffd}) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:13 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309ca26b5a5bbb3ee809685c5cc9987e3dd1b77eb5a0d6bab83f15c1cd0e3b0fccebd38b91631496d52babcc92b2ae20a281e3b7ed205e99b7d86f1149a10901f726d64c0844c6a72c1d344b69d288a91deddc1ce9943270d512c4af392ddc65365d5ca2388025de21d27e9ca9af9fcc2fd4b44fbab8efa673e6e767151de55cc06638cd10c38656fb11ab054c4d1cf3cfeaddb558506946a5ecfdd5218db41d5673b1f016bb8ef30f593fe24eb58c36f88528fba2a481c3bd473815f67b41af576892ff9f873590d6335e399dc8f18b600ac23e1f4e831ec6cc6b7b8e28449add1a6ae0aa5139a18dbbb1f98985c60b04ae65259f5907e5568a290adc0a82a4db032f939a9fd5e1cbd458"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xffffffffffffffc9) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000740)={0x0, @in6={{0xa, 0x4e20, 0x7, @local}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000240)={r7, 0x0, 0x7, [0xfffffffffffffffa, 0x900000000, 0x3, 0x1, 0xffffffffffff15e8, 0x5, 0x1]}, &(0x7f0000000300)=0x16) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:14 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:15 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_rr_get_interval(r4, &(0x7f00000001c0)) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r5, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r7}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0x206) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:15 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000200)='./file0\x00', 0x0, 0x4}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000240)=r6) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:15 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:16 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000300)={{0x7f, 0x8}, {0x2000000000000000, 0x3}, 0x8, 0x1, 0xffffffffffffa2cb}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000003c0)=0x14ff24deedc7c3c6) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r4, &(0x7f0000004680)="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", &(0x7f00000000c0)=""/57}, 0x18) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c0561f00000000000000d49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1db2fcbb75eda4ed448743775106373dbec198b2a04f3487f0226c6a1a793fc4754386cedc711cb7dd26cfda058605bc53428dafd3789b83760b210f30fa5ddaf06dc96a3d7b7ca787e8f76a3dff4dcf6b3d74096226a0ee1405c541197f6ccef3e97ca951155210706bf45dd9d0572e6c9a8eb874f15473c918d6527e34805d6f06546af0a721fa6bcdba5b2fd497287166f88771be21c617d6e6825339403b93e1569564dd1176c7a2266e821065177aab20f404ccf352244a18f35899a8b7a4a4a471607151664c4767ca962f5dd433a2bbdc8"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="504760f74cadd4f7545c34f48dfb833439891ab628b6cfa807b35b691e1d7a55c9"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:17 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x100000001) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) fadvise64(r3, 0x0, 0x7, 0x7) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000940)={0x40000000, 0x1, "ab24cc3613fb0565056ce44684f6e09deec6a0f8e17eb28c8466b9b588f535e2", 0x80, 0x200, 0x7, 0x7, 0x1, 0x4, 0xffff, 0xfffffffffffffffd, [0x100000000, 0x3, 0x0, 0x4]}) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:17 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x5) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x1000000d, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xffffffffffffff00) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000740)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0x5}}, 0x3, 0xff, 0x1, 0xacdc, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x2000000, 0xb57, 0x4, 0x2000, 0x3, 0x3, 0x3f, 0x384b, r6}, 0x20) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf08dc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) 20:48:20 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) 20:48:21 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) 20:48:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:22 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="cf72ef5e4d3442c8037f6d1e7ba350a530bd8c32ef2c5893f67fdf40a3ca099ee4452d5146cf746cc3ff3df8c3c6b6a1a51d000000000000000000"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:22 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x3, "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", 0x34, 0x1, 0x7, 0x10001, 0x5, 0xffffffff, 0xd8}, r1}}, 0x128) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:22 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:24 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x90, &(0x7f0000000780), 0x13f, 0x8}}, 0x20) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB="65ee9497b09659d786f0c30a4bbcf867c060cf54ed942912376a672136c535862018286600e26bd56ff2c1f3a3c4db36bdc4f3ecff6282bae6a401b76df24108547dee3d6c71c45bc3929adf44facdd16b4585cf9f95a25bc1fd40f25afa84a95b39fba35e8e59204e149c207e5d0ad3ef9972658f", @ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR, @ANYRESDEC=0x0, @ANYPTR, @ANYPTR, @ANYBLOB="913d227637c28d55f23845a39f488c9ada4f42fca3752d997da7a363ec834fc125565c9aecedb5709a3c00049975bd758131f2b22997d08f7f788c5e8bb481673aeb0bf2f246cc60d0f14f9f2dc4d76397138a6a1dded88331e74677785200006c8fa265049f1cd2f39aa6f5dc42ac3fa9a8907f0000000000000000ff00000000000000004c53cf0b32712f3abb79ddf904c073e14a3ca1185ef63679d21dbab4c570187c05f99a8129a18531f286e17cc041c9774e", @ANYPTR64], @ANYRES32=0x0]]) write$P9_RLERROR(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1200000007010009002f6465762f696f6e00a10d584bd8054ac098859b6fa66624e1c80795209f689ca7f998d68f678dd246eed215ebfd96fba16f95c4308db05bfce1c27729308c4b482e54368403a742bbd03b29ac2d130f414747d2117d9ac744b429b0184a4660823b6981c00e"], 0x12) setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000740)=@v2={0x2000000, [{0xafd, 0x7}, {0xcf, 0x7}]}, 0x14, 0x2) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000001c0)) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000002c0)={r0, 0x9e, 0x2, "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"}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0xff}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r1, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) 20:48:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) bind$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0xfffffffffffffff9, {0x2, 0xff, 0x7ff, 0x7fffffff, 0x7}, 0x40, 0x6}, 0xe) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) 20:48:24 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast1, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) 20:48:26 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="77b44807d97bf1ff3cde6155734a47993f084dd893dbaf81f13b9e950cf964d7a6da8b0a235e4d5fe85d119c310a9a3cad1fcb492db7bd005054254363bdf5a39955de99cbce2b3258f65900d93c505c3ac5ff216031a3b034b00b754500f3981562bb655aa93229c21d841bf13e2f362b793a9772dfe4c9603e010d031d4e9951473df85332c25d2083f9f653a527e3dcb692c778dfb1e3a8833d997d02b7b8d46ab391331a86ca463f348e98"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/18) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x381, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000300)={0x0, 0x0, 0x0, 0x800000000000}, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 20:48:26 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="a3c882ad5a3317e021b519c26d5e3983202f4d6b88de2ec808ee75e116eeb4bdf7946a47e0c992363fc8c8ff06aae73d2415bebc2670d43ab76782b6cedeab7fd085d73fe31ba004bbc7"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x1, 0x400) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) sendmsg$inet_sctp(r1, &(0x7f0000000340)={&(0x7f0000000240)=@in6={0xa, 0x4e23, 0xa1e, @dev={0xfe, 0x80, [], 0x16}, 0x3}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000740)="e4ae17e5cb442db1d579fb1b5ec785a873987a40538b0f5cd1aad9f63c04ecd77aca37d0275dca85e32fd7fb09adfa44536f219db5d51626dcc1721b901eb61a8487438350f3f2855697e755dcde43725f03d12e3107b9e0741714867bc568d9f106ffd8591705b259b37bc9c83bb3300398d55fa565616e9b6447871b4ad20610a0e2023061f1030b55626a6bba26629d0e31", 0x93}, {&(0x7f0000000a80)="56477b3da3cc5ccc7fa55c8fab8e3be1d7b01045ffb605ab5ae2772237db1774b16e05a834e59aa4cb3922434173132e30d3e75b43ee994653e802863e6a47f32fde4a770b2c746a39b8ff261f9d4507be206bda5f0814e0220e03ce32908f0fd5a7d5bcc14d7cc85d84cc5099072074732f0c85c619dc61c5fe6edb8fe6b73c3264c98444601ff459fa40ad893c2d67e15d2164f84c11393f18d5aa0fc7d9ec62efe5bbaadce8111ad75b62cb7e315ad736ec7f89acb284709361", 0xbb}], 0x2, 0x0, 0x0, 0x4}, 0x4048840) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:26 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:26 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0xfffffffffffffffc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() fstat(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000380)=[r2]) getsockname(r1, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000900)}, 0x0) r3 = openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) readv(r3, &(0x7f0000000540), 0x10000000000002f4) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000040)='md5sumwlan0eth0-security@:$\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:48:27 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0x314) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:27 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf08dc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev, 0x0, r1}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) [ 1207.178992] Â: renamed from team0 20:48:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev, 0x0, r1}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 20:48:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@random={'os2.', '/dev/ion\x00'}, &(0x7f0000000240)=""/15, 0xf) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) pwritev(r0, &(0x7f00000003c0)=[{&(0x7f0000000240)='31', 0x2}], 0x1, 0x50) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev, 0x0, r1}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 20:48:29 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000840)={0x0, 0x58, &(0x7f00000007c0)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0xee2, @mcast2, 0x6}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x15}, 0x200}]}, &(0x7f0000000880)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000008c0)={r1, 0x8, 0x9, 0x9, 0x3ff, 0x5}, 0x14) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6bf45c6f76a8ccae40ede4ed6254f743e99b0d7776a59bbd83e2ba88ea57a8d91dd1fb9c5769dd62ea4e6ef564a57fe1391a2118cf7ccd2b7fae05aeb4af021243ae2edc8d462905b778a3a35f3d26d2761b8b73b71d3c885de1c1f5e65d1f7568ca261344834925e1c892eda2dc"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000900)=""/215) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x8, @loopback, 0x6}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @multicast2}], 0x3c) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r4, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000a00)='lp\x00', 0x3) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000a40)=0xfffffffffffffce3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', r5}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="b835"], &(0x7f00000003c0)=0xa) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000740)=@assoc_value={r6, 0x3}, &(0x7f0000000780)=0x8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) close(r0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+'}, 0x28, 0x2) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000240)={@dev, @rand_addr}, &(0x7f0000000580)=0x8) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) 20:48:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev, 0x0, r1}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 20:48:30 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r2, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:30 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000500)=""/75, 0x2000054b}], 0x2, &(0x7f0000000a00)=""/191, 0xbf}, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) 20:48:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e900001000000363cf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3fd, 0x2, 0x0, 0x51}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cdc1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f138ce595b0ac82c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda98b0b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x14) 20:48:31 executing program 2: readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000004c0)=""/68, 0x44}], 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x1c2, 0x0) 20:48:31 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:48:31 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:48:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="ba16b6d2b5ef6aa27e5df2847ff70bf64e88004906e92573f6b844a21aff926cb627d165b5ddbee35650b7f81c443e38065a0500000000000000a115a7711139e5facb307c94859203bdc5bc813b5220fc86796115f56a6ce1e1bbd0526b8f0a9fe6eb5e8a07f32005a958c7b2dbbca578b1c6166e42fbb9d500261a2cdbbbb933b19a4e4347788d97b7cf3cc0e0a67ae0"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000000c0)={0x0, 0x8, 0x3, 0x5, 0x4, 0x1000}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)) 20:48:34 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:48:34 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r2, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x803) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:34 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) ioctl$TIOCSBRK(r1, 0x5427) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x9, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:34 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r2, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:34 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b7"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000000c0)={0x1, 0x8000}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="2dde35e43031858d540d63cae7ba653f6f682453786bd853cf0f4b196817b6c2c388a2f3d5ae400e22867f322ffd1ac8a0b3428096bd9c361dc991e56993a7402dfd04cb757671f16e5ea9c8ca0405c8fbd7aff70c774f407d150506d6f8677d518ecc6aa0ec41168707878c5738d523783c85f70665b43c3b4af971e7bf56659db528524c8d7b7b9bb5bca0aa7255d7f4599bcf1f5da637a4d3a02dccbce256131b89b88a00000000000000000000"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:35 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x2cf, 0x0, 0x800, 0x6c, 0x5, 0x7fff, 0xa01, 0x9, 0x1f, 0x100, 0x9, 0x2}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:35 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x100000001}, {0x1, 0x72}]}, 0x14, 0x1) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) write$FUSE_LSEEK(r0, &(0x7f0000000300)={0x18, 0x0, 0x4}, 0x18) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:36 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() ioctl$TUNSETLINK(r0, 0x400454cd, 0x32e) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0x3a, 0x0, r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x7, {0x400, 0x3}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r1, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:37 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:48:37 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r2, 0x2, 0x1) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:37 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="63b9bb7718d0f320b8daacbd6a06f2398d31c1d0acbb04005e04a798e4ee869f886315b5f80640f53d9e2a2e9e3a9970688bffd6b7cef5149fabcfa1effb945aa9ec00fef5045364f9f158a2af8cd5f7"]) getsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f00000000c0), &(0x7f0000000240)=0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:37 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f00000000c0), 0x9a, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:37 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:37 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b2527324901505f4af3d43db52340c9099de681b4962d18bbf80144ce799c9dc1486b3244f4ce6636e3be15333c983cccb4c60958c44dbe83965"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0x9, @local, 0x9}, 0x1c) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) r6 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r6, 0x6, &(0x7f00000001c0)={0x25, 0x53, 0x0, 0x401}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, &(0x7f00000000c0), 0x20020102000007) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) getpid() getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)) getgid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in=@remote, @in=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000e80)=0xe8) getpid() getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) lstat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xfedf) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000018c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001900)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001ac0), &(0x7f0000001b00)=0xfffffffffffffd2d) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001b40)) getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in6=@local, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000003d00)=0xffffff80) gettid() fcntl$getown(0xffffffffffffffff, 0x9) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) 20:48:38 executing program 2: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000002f40)={@local}, 0x14) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='team_slave_1\x00') 20:48:38 executing program 2: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$full(0xffffffffffffff9c, &(0x7f0000001200)='/dev/full\x00', 0x90040, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) clone(0xa1000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) socket(0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000080), 0x8) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 20:48:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000080)) 20:48:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)="88", 0x1}]) io_destroy(r2) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000240)={0x28}, 0x28) 20:48:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)="88", 0x1}]) io_destroy(r2) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000240)={0x28}, 0x28) 20:48:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x600000, 0x183) 20:48:40 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:40 executing program 2: creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/140, 0x8c}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:48:40 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) sched_setaffinity(r6, 0x8, &(0x7f00000001c0)=0xe89) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:40 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x7, 0x4) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000740)=""/188) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4bff) pwrite64(r1, &(0x7f0000000600)="793bc64d02a434298c5edce59572ea8ffec28c1d0ee3715092459207fe850a55a4f8844314ad1ef00a7e6c92aed8dd67108118e2ad55d411c765af947111ccdda3129846aecd4ef4434f15bf149ef6f6da0c59aed05edbfed51123fddf2ad83fda1a94322695a8dde7d59a3c49cb3820e9c47b0a4160d156fa40b19dd77b35dec80d207fd1e96f4b841be24d632b7f81a9bf014090eed210ea684444a63ca074bd036ce656736b949f1faf8110d9dc876baa773311fb03c5c1f345d141be4d859875407979941be8a18b0e706da5590659a91da85ef50efe0733e6b23e7ff6ec4d29a8024b72b7fff393c99d336100525cea3783ec85484a859b0ad6519561dc06628fb170bc076751a86ae7693296152272df91b5fe774c908f7f6d35ee9df70e4187b070a427cd1708a8a6ab8560423830da27010b2528a58d305c8fbd0c9ba3135c2723a606bb6c1b6e0b76e5d9ad5136579c7fc1fbd101c84cbd5de08e10adab0fed25389f245c09bde0be7c783f9c4d5ce655b6bd1033186a78a2ac7596e84fa3461aa09a4cb2a5df1e61acc15a8f4a5ae32cf7895f683e8230d03bc7b21a91b4482b692f616e89f38aaf9846105064b2c703d7ba915dba889cbfe730080b3699a96ca2d7aa711c5f1c70615bea82524c36101b79184f1e9a3c2290db838e15c7ad3d7c11673e07fbbf9942ad796715b0b253fe9fada33eb485e8b8b494d23731eebec4cb3a5aa0d9fa6975591b59c621f8f284426b7cd1f0d2436151efe5396b23fdc9f0f48743221ff90db37a45652450c872301ae862caeac6d610612f2258135cefd77cda795dbfafce1c98a751eb62828b246f5c71a628ff60f352e818835a40b4eb872fddade12f48708cd23ac81dd19788316aef11bc65c8d21d382191719373a7c78ea0aa1950801486180132519befb262b1623a50302d8a656c279108b07aeccdaf7efe96cfc731a2bf733f85a7076804729186d2b487d7202ae496d85dacb5a267f8f7d268f7081acc8740db0a3ef9d2eb22b93697a64024f7a3d11e208067fd34316bfe67a21285438f55579b108cfcd0834ca2fc3ab76b7cd4fc0726bf933ecd52bfc45ec53f203f4a6b43eac1898c2e9f711bb9b6fbf2909a3f9b8d0d6de3f68b415e779c67ab9802e1c9180bc8f8276ef6609ef0f901a3ee686fc2807123aeb200fd4cc7286d4c66a64499a53a5d18e550af5511ab23fb36025b1f8af27618c7590f5a957616c5c8a93958b8007b16af4ae2d0cc3f7fce5aea39c1f864a0391295bc41c50a0b4d1348937cb89b4c55befd3ad65d1bb799742855f7a2aa1e7d206db03509dadc9bc4c410c9ab4bed95fc3b5b775dd8df4ece6165bd462cc50e3072454f2dc7746e87caec8f1abce8bad1719a7ede8ef06970cd5b7ca48aab77ca411ae35900cf6f5186fd15aae0d03cb6623c392f552d17f7d881c1cb71fa85c40dfb3a424a07cf2e9b00dee151f1f956ef7fac8fcd4b56d9f3d7e6c26cfaa98dbce27c14a07e44dcd050b70626bc0191c764ef531ff6c05fb01f452a730600232d8fa24c69611754a0bc6e612e15616237e8b5015bfba57e55640864df95fdf2dfba25ae2c04e91c2ff5e061f56f4709999c70ac855b4f30eba60249ac88be38ce44ef844785e4f2aab3abf1134c0303fc5b935227392da527a582543576c6b27eac08f2f5c20884d7aae11c12078f23496c11295bc3f41f1f05c5b4337bca43de6aa3e7eaab1917eb32fd467896b41fecd70d224a0095fff85e6036e14b8965eac21a9364a6f19bc2684a2e063c0db11a71486dbe6df70059377802778f4e3a4d31036ad214a0577d7f882ad0e48c0c97c183126274eb6607f8ad9483b8e9f0285777b4a99ad297b4fd16df94571d62c35488bd39982115faf0d01f045aee6d8f2f0701d9628616b74b2fd12644894cc529c959b7e535135bc77c01a0fc67212795aef5219b4610c1402692f10d346f0d997020a0bc9e29b7bc024d44ebfa89671038d8571d5e31fa04b2cb41d4f6b4996d34e985ea734d626c341d15c1fe03014822bcc073a0d3eac04abdb14e5b1762d3bdb415f0f90bdff735d3922bcee933a402883f218b9d5877bdc62f4a2a1526ae37e366b8050450ad2b61e6b2a849dc2d9d172d9713de927517fc83370a869fc01f364afd1b1af1b90af54c835d7b62507a23495a31bc1123e3c3ef0c8b8a95c58fdb4a20e301bc3bc6b5efde14fe51e6ee4b86d1fcb65396136a7d3d8a5b8ba73505a5130b9ff230a2a18b0c215e7da6ad898da9e9a813109ab0ef401151a9c95e5c2ef05a5e987916a1ccac089747006b13618714d1143aa9cef2995257a1d3257c4078743ae8a802938c9a9bf1518aae119ee5986f796fc3280a467dc1ed566458cf187d0e513f2e25d141f724443cb99e4b9d3f140ad0ce6332762436ecb7497eb865f1f638f2242952ae403bd18782eab9ff0d2800bf582a43da346786a45087e48f5177445bc06a4eee83f95916327e684babafb8fc9f3eaeeab6a4a56f80c4515a3d3a8315c94d724aea8832a8b315f95382f2c5d2d51dfcdca7a6e8747ad5e73d7a50c1d7d7163fba5069f439ad7a866338cf33ba813f4ba4fe00d55e09394b1cd0f514b3cdf5b506a3741da53b9aac96afcd083c5fa9dd98be3ccfc6136cf684aa43df8b1212403e7b5e82ac343170cf47d7de21a3e68558b89f58ca12ce884cee1cc9c1ce2c86dc8a7baf1887cf1613102938fe8897eaaafd5e45da47e7a9c0fa93604a8ec783f9b30cf0f4573dbb552f355a8111556a5b8ebd4d0d95718480b19adb87d26e5f9a984bcc9aad6b19fe75b3375e841637871e4dd442a823a65829c5e5030d9d163d639b78bf7ca8a542c14b7bf626023e45a31c668e00b869db990d1cec19b500adedb7edc82b4138f22e27faced27a9bcd614c5bf05cc905f25f61e9faa66848cac5db4aebfcbaf672dbd3c87f9d07606acf76182b1d13338b67887c5f1b68f1f3edda2e737636d05ffa636a2baf502cbf8c42353cdb8598c8b0a0871331ab2d3b14208d49e95dc62841bc66c24f021fcbc8112412887e5254d00413a5d693c5995609864716999f840341b3dd2b4b6a10371623e51e2ce222b3025ada9f13a30c097b04f263d49193680ea3fbfb7e08944a5dd54f50862d16b4c7ae7122de0172f2d5bdb921f7f99951c5d58555c408b2f2391ef116ede48e385d5c3af211b0d2786fd8825446083fc7a234a82c18e494fe51f1dc174bc02351128ba91cf8443669e758202c4b55a8f0a4ddea4f4c2c24e3da6e3646e3a629e966191ff72529db0932d4ddda15c9131b60214225e9427c324c7f9b73e14948ea1f2f89e9ecf6e463298d4baa865fde3b1f841c9dca52a7989349ae38c8910d997e793478219a1647bfeae851d5d91abb75735d302e87d5e1fc95071fd19a417902933ed98fbc6f35bd4bd18d0ee18a2304be94e42137c39a2c688f8061b5707918f480d2e1520d8554bb5e7fcbc392efbc3fb9847dac6149d941185e59593bd74899b50d3bbd84f3cd090980c15574ee92e85258a836b9124ba0d087a943e7b51b87a3b1dba1932ea151a6c02d01f4b8715ce4d1ddbbae31bd4a1f6afe0702d227edc370af1197a0ef454919d3a1f058ac939dfe8653d2f4b6f5ee91b1cb0643cb2bb059afe6c46fb0741ba260e21cdd20c59e352fac4828dd757c00816df2d800632fdf3c27a517aa0bfc4318240b946516558c28319900cab78d031362f9eb580c9ed19d78405e855b75ef70bbbf35944c4caf13effc63a3b047b257c7387ca5701ac578f94db02ce791c116447614418130463af98ce64de968e5c09a4912a063dafdd515259dc89fdfc551c0b0d4e443a4d1fea0de50bb9197e41793743377d07164b1b8c182d6232b7525819af73e0be8b72c07859517e09187d21626790138bee51d418dc39892b76a272e472868f8b3ef1cecd8a9528670d2a34fb4f7124cfcf875e9c52935afadf4fb916f107522e84178435cf5763e96d046e955b7061db67bfff946a8b16f16e58a4a1dcc185181746161d8fe8ea18b0986ef1b7a395ab7b0e60224b70060c9c308c035940ca88f47c3d025f609862248043b751e1f0f324ed05e9b8159eae4d859bc529dc9425beafdc25c1acdbca158969aa4254fb34471d8eef92f37808b5c7b6ae2999de7950307f52b992fc75b730b5f2e9543ca6b1d3d1e5db5739993ef459ed66897bd01a44f7dadb8e777d8a7575f5a2f4d18bcc56b15e89e3ba3e26dbd314eeaa6d4009fec869abd17dd42fc1067fa9d8b7de477749b3c43e0e96da0695d392a37961ce01de1dcb92b2713181f97a75f1de9ca94412a722d65b1063b96353f7136cbd079a4d7339e6a4e0e074e3768b8aa2b3024fefd372afe80bf5826bbd7e8a059755eb1b90b914982f7bf2972ff3853bc025d16f48f7a4f3462b90b7aa78cd61d2c946c9433e10220cac7ca0b925d81d0193f585b71153c53a0f6e9f49421b2bc0db9a2a3525276487b95a460ff1ec9799b0ad1c2310c8fe95e023bb377c4ebede9731d2117d7a4b4810cca6d43e3fcccc7d12aad0cd6a52c0b739716f393ac9956934fd71e276d009da7513e8a2e75358e9f1c90dc32145c6748621694ee7b99c7d0b567798b4e82563a34f6adf35ac19979983a37c6a5a99f5940867b3c1ebcc31e7100818a2c49ce2d3bb270da8e1193f2f5427fa4590aed65d9d06c8ca3c1bac934207b2dbefd951ece0a68b741a8308232655909c195c43488e92fa7c393e35c2b84924e0a9008926e4c34d9205f3e93a03f7ca32400ec1eed719b683106ac1f49ee9ee201c0070509c072bad8d315a17e31bd6991af15c6593a1c08806a119283b550e753d323e7df3fac9a3f68380db2e84c04c28c2d06dfc12c186f4aeefd6ca9c0bfad1bf3e5f1562db01ea29ecf7641d818376e778accff02508c8c138ba250a4165cc7740faf0d3413a2dfe827f2ea58781151d8f663a3dc5471d01f8c6178aaa9eeb6b5fde3063ce3a2bf0aa0bfaf96b10cd9dfd1a5178f4bdbf0c4a16fc4d4678e001caab96e1c", 0xe00, 0x0) pwrite64(r1, &(0x7f0000000100)="b0", 0x1, 0x0) 20:48:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) lseek(r1, 0xfffffffffffffffd, 0x2000000000000003) 20:48:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) socketpair$unix(0x1, 0x400000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) dup2(r2, r1) 20:48:41 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b7"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) r6 = getpgrp(0xffffffffffffffff) migrate_pages(r6, 0x6, &(0x7f00000000c0)=0x7ff, &(0x7f0000000240)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x18011, r1, 0x0) 20:48:41 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '/dev/snapshot\x00'}, &(0x7f0000000140)=""/49, 0x31) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000480)=ANY=[@ANYBLOB="05000000000000000b000080080000000100010005000000810000000000000001000000000000000000000900000081"]) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000009c0)={"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"}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r3, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r5, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000200)}) 20:48:43 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000740)) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:43 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:43 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:43 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000)) 20:48:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000000)) 20:48:43 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="b3622458523907914a9b5c0f3f3e8cae57a88a07550fec7f8093bec02eafe1e6aacb6ea112bf798d0b9cc87bc85470ed9bd335832312d09819bf398a431917eed94ed6e6e062c5edb8916740ed38fdfa751e3e054bfab8412f64f12279f134d18b9ac64c5d22f367f69f99fc381d1ee6f2429a41cc5f36e1357a59d6cc3f1dfa22a883"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) getitimer(0x0, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r3, r0}}, 0x18) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000740)={0x4, 0x7ff, 0x400, 0x0, 0x0, [], [], [], 0x5, 0x400}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000cb3000/0x4000)=nil}) 20:48:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)) 20:48:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)) 20:48:44 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000000, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:48:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r5) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000800)=0xfffffffffffffffc) 20:48:45 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)={0xffffffffffffffe4}, 0xd) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000002e80)={'bridge_slave_0\x00', &(0x7f0000002f80)=ANY=[@ANYBLOB='3']}) 20:48:45 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:45 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="009624d97cd776dfc51be181962c8a7a1d0f02aa", @ANYRES16=r6, @ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x40) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:45 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)={0xffffffffffffffe4}, 0xd) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000002e80)={'bridge_slave_0\x00', &(0x7f0000002f80)=ANY=[@ANYBLOB='3']}) 20:48:45 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:45 executing program 2: mkdir(&(0x7f0000000740)='./file0\x00', 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:48:45 executing program 2: unshare(0x8020000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffffffffffd, @mcast2}, 0xffffffffffffffa5) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000000)=0x2, 0x4) listen(r1, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000040)=0x4) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) sendto$inet(r3, &(0x7f00000002c0)='q', 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{}, {r3, 0x40}, {r3, 0x100}, {r3, 0x20}], 0x4, 0x0) 20:48:46 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:46 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:46 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:46 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:48 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="821ec627efb960f07804931cc89802900aeb5186e9dbb8521d0e78a2d984ecfc10ef8738dabca09cda6cfbb933cbf2aa2634a9840be7ae361393fb8a7efeccddea255f121a2c2bd044db1bfa4df798ea5e79f87f8a83eaec8ff0ef57da50f9c78289d0a0b9f6e1f555a684572d40e219365092def61b86024d12025e52040a683505b081dffb0cd9b2cfa1ebf77fd588ac21f38867f06aee4f928d479916a711a1faceb8fa6ca9b7d3dbc16175ec99e60e052aa8433f3377d4631905497642061adf13cea8e7e080df83ca3a14a1"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:48 executing program 2: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2c00070003000100000000000000000000000000000000000000040000000000000000000000200000000000652507ca646c26cf3563ae595de9418aa49c5001874f2ab2110e46d0dcacc69f1f88acf973f3265693ba4cce1473e12f0a3da2def10085a0b9a5448e620ae97cae453ddfa4c2b27d5b680a7796c3216caa0c662c8ca85163930bfba8dace02fa952122e8c1eda2994b62f9b4eb7d02def05d62963931ddab62beace3d39d"], 0xaa) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 20:48:48 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c61b1981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed484e850b491b0304d9181e583690a50ab2665ef6ec93bee5187d1ea1185517bc08983bd8c92e4b8888bf7b02b4c3ff61f8cb7bd6b00d1"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:49 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x6edb}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={r1, 0x8}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0xa00000000000000, 0xffffffffffffffff, 0x0, r0}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000800)=0x9) 20:48:49 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_xen(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10020, &(0x7f0000000380)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@privport='privport'}, {@afid={'afid', 0x3d, 0x6}}, {@cache_loose='cache=loose'}, {@uname={'uname', 0x3d, 'team\x00'}}, {@access_uid={'access', 0x3d, r4}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl(r3, 0x101, &(0x7f0000000440)="aa754154b86fa008c3ccf2058d201d78e046e409f9df2ceb6105babe42dc") syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:49 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:49 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000000)) 20:48:49 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x6876, &(0x7f0000000400)=0x1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x10000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) utimensat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={{0x77359400}, {0x0, 0x7530}}, 0x100) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000740)=0x0) r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r3, &(0x7f0000000780)={r0, r1, 0x2000000000000000}) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000140)=""/100) 20:48:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x4000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="53459935142744079f78a6e932e7b85d780152228f99bb49f0ca39977546218aa413621446fd767afc11afb5e742b771010917ea4f2e2b68bd2f9dfdd8a7fbd7e37eecc8fed6a2101507c1cb16fd140202059ec47bb50ed5a96b06d9224f15547cb2f429a057ce4800efa8813da34e18c44e949bf36e60f47111a7685be3"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000f6d000/0x4000)=nil, 0x4, 0x5, 0x10, &(0x7f0000eca000/0x4000)=nil, 0x401}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) write$P9_RREAD(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0xc4) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:49 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000180)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(0xffffffffffffffff, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0f3a57b1c783e5445143739377e60f8a29d74acc68b0ee7124f2ae7dc4124bc0ef235e44ab05a7f4799e4e830a34704c9ae74f10d71af602689105e7567226f1a16a6fd2551b1dbb832acf36"]) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000240)) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r0, 0x2, 0x400) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:51 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:51 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:51 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="912998f8c38f970a4d245d44182bcfca5b5bd4c2435d459aeee8d6a5d4322f2f41b4d077ca971ca3a1c7a0a21ca3b90adf9118"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000003c0)=""/158) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) r3 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000240)={&(0x7f0000000140)=""/109, 0x6d}) fcntl$setflags(r0, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xffffff8c) syslog(0xa, &(0x7f0000003680)=""/4096, 0xfffffffffffffeac) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) 20:48:51 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f00000000c0)) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:51 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000300)="a81135c94bcf49a1cdb7d0a1bc79c18fdb4e75c6b380d887ec182565050f35570db4dfcb72dc04bba21578d6ad20ce0532d2d47019f91ca4e8e34cdcea1958edd1052fb5b07721c6d07d8b606de38c4c037c967074859ca211dd25f3ea4a11d7", 0x60}, {&(0x7f0000000740)="7d66a3290855cd84cc012f159822811dff296a17aed74fd50c7e08d289cebe2d4341af5f98d86cf37020075a21a3f8319e18facc85f062e25b8ecba5f44060e726cbeb2173adedd1f20ce36d2b6e517afe24bbf579f848d57e70238799033480f1280440740f", 0x66}, {&(0x7f00000000c0)="2c9ca991", 0x4}, {&(0x7f00000001c0)="07c55f59e39d93476177642048853466626e2b85ab58fff8fe73f95b7fdb2bc53dc704aabd241e3eb7194327aafc9e8b6c732fb4dac2c0a1", 0x38}], 0x4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:51 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x400000, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) io_setup(0x8000, &(0x7f0000000300)=0x0) io_destroy(r6) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000240)=0x1e) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:51 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:51 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:51 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:51 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x6, 0xffffffffffff0001, 0x7, 0x8, 0x0, 0x13f, 0x20, 0xf, 0x5, 0x0, 0x7, 0x8, 0x8001, 0xdb08000000000, 0x1, 0x7, 0x5, 0x7fffffff, 0x40, 0x6, 0x401, 0x9, 0xde, 0x2, 0xebd2, 0x2, 0x7ff, 0xfffffffffffffff7, 0x63, 0x8cdf, 0x5, 0x400, 0xa6aa, 0xff, 0x1, 0x7ff, 0x0, 0xfffffffffffffff7, 0x4, @perf_config_ext={0x7fffffff, 0x8}, 0x8004, 0x5207, 0x4, 0x1, 0x7, 0x1, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:52 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ppoll(&(0x7f0000000180)=[{r1, 0x8000}], 0x1, &(0x7f0000000200), &(0x7f0000000240), 0x8) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x2, &(0x7f0000000740)=[{&(0x7f00000003c0)="42e387082a258da45e7941fdee843b2fe3f4b7ed67fa6d756c81e1b30e3457f1d1ff13b70848c531d14a7982f5c84ce98ebdf3c7c5f4e430", 0x38, 0x4}, {&(0x7f0000000400)="8a0a857e21105ec3ad5a", 0xa, 0x7f}], 0x20000, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00`(JE\x00\x00\x00\x00\x00']) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0/file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:52 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:52 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:52 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r2 = getegid() getgroups(0x5, &(0x7f00000000c0)=[r2, r2, r2, r2, r2]) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b9af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b22a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544cd4ee2d9bf6cc663300def2a36301a0051479863552f7fe049ffd478998941a7ab6c34625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0eb9cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ed009685c5cc9987e3dd1b78945451e4c28e157db86edb38c5f59566c19e99d384e4a3fde29b0e268500d3fa7b8e719704df603248a7ad10df01610ab6a40a73339978dabca941ad369e32c91100b91111825d616cc946158a747ce1301e8a005ff3ef184425d422a0eaffe9f487dfbc8d844b4e6dcd0041d7933dadd28afa2a5359e082f595fb8e91736a0dc49f7146cb4a0aec19c6f0e735bc965181383c0486c41bcbfdd175098975c3067e900a0152017ce00cb4bed92a33d7168155639ad3f1c39929b184e7a80bad9943a61f58620ac8da4711df08e9a51190b745ee822c882f2fe19575c7fd264d44d25ab875c9604585b958943e19f0000"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x6, "afe8739bddf9"}, &(0x7f0000000300)=0xe) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r8, 0x1, 0x5, 0xbec, 0x4, 0x8}, &(0x7f00000003c0)=0x14) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:48:52 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) [ 1231.300798] 9pnet_virtio: no channels available for device 127.0.0.1 20:48:53 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1a) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:53 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:53 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:53 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:54 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x7, 0xc6b, 0x9, 0xaf, 0x0, 0x2, 0x40, 0x2, 0x0, 0x2, 0xfa, 0x3, 0x4, 0x5, 0x5, 0x0, 0xb6a, 0x100, 0x7cb04c25, 0x3, 0x100000001, 0x100000001, 0xffffffffffffa7bd, 0x6, 0x10000000000000, 0x1000, 0x6, 0x40, 0x7fff, 0x6, 0x1, 0x80, 0x4, 0x0, 0x7, 0x7bd, 0x0, 0x6, 0x6, @perf_config_ext={0x0, 0x11412688}, 0x400, 0x800, 0x1, 0x0, 0xf0f, 0x3f, 0x100000001}, r3, 0xa, r1, 0x2) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0xe, 0x4) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:54 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000140)=@nl=@proc, &(0x7f0000000240)=0x80) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:55 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r2 = getgid() getgroups(0x3, &(0x7f0000000340)=[r2, r2, r2]) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x102) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000c40)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x5f, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000a80)="74dd9de487d30949b8bf00f070918f13f6bc4090acdc8d0fa136c7d6ed730098ce134cd2495ab4f38a889bfdbd5a1823108bd62f8545bde10eaddcfe4eca959ceaca8a9ef51ce834cadc2872ced2e08779fd1a13eeb43103993bccb194ade6108164bcb186a65fbb4c3cac2115a528711626dcf49ba5447d6c9f16177c3965d73798b6703287bc154d27ce5c5197a8b35a7a7f80873986aef7371bf7d4c49c6dbbccaf062330ff3b3869119fba3572680ea13f27fbaf3705bf1760ac7f02f375f863ee2a8186f6eaceb40b3aa5139816ac89081603ff55ca9814b71628", 0xdd, 0x3}, {&(0x7f0000004680)="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", 0x1000, 0x9f0d}, {&(0x7f0000000740)="ff8b205e18e6b7e7979129087e8cc6dfc11e08919c959e26e9408796a4f85730142a6cc248eb43298954ed50c66b4dd4d9bab02bf88681c71a5bd7f8a49f32f715999a13a37783ac3053685793515181ee494a8d9b5bb44014370fc061f44aa9f356e65ea87fc2f83d6a97ef0bec96ae1cba38ce1172e6dd9c5d8172d4b1e164bd14d05b63552148c7f8874eecd0ce545e1bce09783275232be73c600cc79b44ce915cef380a2feb772892031b467115745fc6b67adcad0dcaaedb4a", 0xbc, 0x1}, {&(0x7f0000000300)="35c2b8d9bd763b8309a81bc50f5a9d3e3450be314e58ec99f2ba213dba2bb9ac", 0x20, 0xffffffffffffff80}, {&(0x7f0000005680)="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", 0x1000, 0xfff}], 0x880, &(0x7f0000000c80)=ANY=[@ANYBLOB='dots,nodots,dots,nodots,allow_utime=00000000000000000000007,nodots,audit,uid=', @ANYRESDEC=r7, @ANYBLOB="dbf87360af530e8d78ba069554195b6cd7410a57de3311d39932abe098c10600c87ab2723f625bd73f7948fac8db3d5b4becd8653808277723c98690e8ccf56b526af95621ad14c2ffaa484eacc62c8921f587cb00000000"]) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x2000, 0x3000, 0x507, 0x2, 0x100000001}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) [ 1234.374926] 9pnet_virtio: no channels available for device 127.0.0.1 20:48:56 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:56 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x82, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:56 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fcntl$setflags(r4, 0x2, 0x1) getgroups(0x3, &(0x7f0000000140)=[0xee01, 0x0, 0x0]) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, r5, 0x1000) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:48:56 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, r2, 0x0, 0x10}}) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="f3a178bf6a6301d93134a877e6f568e915d9b56be637c745adbc0a692ceb007dee46252fb631602612704b1bcdc6478ad0f6d57aaffc3f9972462fa063dab788669c4f225af4d765cedc69ac1beda41233bae5a053b1990cec7ca5750fd6e44568a1df00e474b93dfcd6b7ecb2b205dd3809af0f9b26af0b67a215f4e234f4a62f775c091ff931e54ae35a9a417b50c6fc97d3732feebc5b05824c5ac941792bb82762415ce583976b0a75193910011ad8d3c7c000d58a3f612e0ded1d5bfbd873f48fc698abb2971a5f421a0cfd9e31f43a96e2830f4b9f81ac119c5a"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x40010000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000940)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote, 0x0}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0x9, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@local, 0x12, r7}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:48:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:48:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) [ 1238.500816] FAT-fs (loop1): Unrecognized mount option "audit" or missing value 20:49:00 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b7"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x5, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:49:00 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0xf, 0x1000, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x80000) socket(0x2, 0x6, 0xd3) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:00 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:00 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b87ba170ec4d3b471d1c8168b0eba77a0d9e2035cc3abe9d56"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @local}, &(0x7f0000000140)=0xc) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:49:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) 20:49:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) 20:49:01 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) 20:49:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pwritev(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) 20:49:01 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000000c0)) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000240)={0x7ff, 0x4, 0x3, 0x53, 0x5, 0x40, 0x1855}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) ftruncate(r1, 0x10000) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:01 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000940)={0x354, r4, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x184, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x9, 0x18, 0x1, 0x100000001}, {0x3, 0xfffffffffffffff7, 0xffffffffffffffff, 0x5}, {0x400, 0x0, 0x100000000, 0xffff}, {0x8, 0x1, 0x42aa0d0d, 0x101}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5b7a}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x164, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x354}, 0x1, 0x0, 0x0, 0xc004}, 0x4004080) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r5, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:01 executing program 2: socketpair$inet(0x1e, 0x400000000000001, 0x0, &(0x7f0000000280)={0x0, 0x0}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") write$binfmt_script(r1, &(0x7f0000001500)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000005440)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/163, 0xa3}], 0x1, &(0x7f0000000100)=""/190, 0xbe}}], 0x1, 0x0, &(0x7f0000005d00)={0x0, 0x989680}) 20:49:01 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:02 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e24, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r2, &(0x7f0000008180)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/13}, {&(0x7f0000000080)=""/31}, {&(0x7f0000000100)=""/34}, {&(0x7f0000000580)=""/216}, {&(0x7f00000003c0)=""/217}, {&(0x7f00000004c0)=""/175}], 0x0, &(0x7f00000007c0)=""/160, 0xa0}}], 0x234, 0x8802, &(0x7f00000083c0)={0x77359400}) writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 20:49:03 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:03 executing program 2: io_setup(0x7, &(0x7f0000000280)=0x0) io_getevents(r0, 0x2, 0x80000000000005e, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r1 = memfd_create(&(0x7f0000000040)='securitynodev:ppp1bdev\x00', 0x0) io_submit(r0, 0x144, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) socket(0x0, 0x0, 0x0) io_destroy(r0) 20:49:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x2}, [@ldst={0x4}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x10000000000001, 0x8d, &(0x7f0000000240)=""/195}, 0x48) 20:49:04 executing program 2: socket$inet6(0xa, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x91) r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x20000000000003b6, &(0x7f0000000040)}, 0x1) 20:49:04 executing program 2: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) sendfile(r1, r0, &(0x7f0000000240), 0x40800fff) 20:49:04 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:04 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES16]]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x7, 0x9, 0x2}, 0x10) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), r0, &(0x7f0000000340), 0x4, 0x5) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000740)={0x6, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e23, @remote}, 0x1, 0x299bce30, 0x9, 0x2, 0x400, &(0x7f0000000480)='vcan0\x00', 0x7, 0x9, 0x4}) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) mount$9p_tcp(&(0x7f0000000240)='127.0.0.1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x8, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@noextend='noextend'}, {@privport='privport'}, {@posixacl='posixacl'}, {@cache_fscache='cache=fscache'}, {@privport='privport'}], [{@smackfsdef={'smackfsdef', 0x3d, 'wlan1vmnet0md5sum*+'}}]}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r2, r3, 0x0) 20:49:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000000e80), 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x31a) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=""/20, 0x14}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) write$binfmt_elf64(r0, &(0x7f0000001c00)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea0002000070010046acea0a000000000000f7ffffffffffffff00000000ffffffff000000000000000001000000010004"], 0x6f) 20:49:07 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:07 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in6=@loopback}}, {{@in6=@loopback}}}, &(0x7f0000000cc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004240)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000046c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004740)=0x80) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000340)=0x6e) lseek(r1, 0x0, 0x2) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x8000fffffffe) sendfile(r1, r2, 0x0, 0xa5cc550) [ 1246.045213] audit: type=1804 audit(1541796547.825:169): pid=4643 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir828369045/syzkaller.ALUMfP/608/bus" dev="sda1" ino=16680 res=1 [ 1246.844141] audit: type=1804 audit(1541796548.625:170): pid=4653 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir828369045/syzkaller.ALUMfP/608/bus" dev="sda1" ino=16680 res=1 [ 1246.896222] audit: type=1804 audit(1541796548.645:171): pid=4643 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir828369045/syzkaller.ALUMfP/608/bus" dev="sda1" ino=16680 res=1 20:49:09 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r4, 0x0) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f00000000c0)={0xb, 0x102, 0x4, {0xffffffffffff0000, 0x0, 0x9, 0x40000000000000}}) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:09 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f0000000380)=0x0) io_destroy(r1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x6, 0x10}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r2, 0x3, 0x9, 0x81}, &(0x7f0000000240)=0x10) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:09 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:09 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:09 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="74ab9355bbfc02551a72a7bb9d274df7a52c202f670b792bdaa62177e8a2c735b0a7a6b3162c309daef4118503a090b5feac4e947499b5efa1472e6cc7af0c53ac8ce25ac666010e9a046753d085281eb3"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) r6 = pkey_alloc(0x0, 0x1) pkey_free(r6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) socket$inet6(0xa, 0x5, 0xe880) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r1, &(0x7f0000000140)=""/116, 0xffffff3d) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES64], 0xfe5b) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) close(r0) 20:49:09 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:09 executing program 2: unshare(0x8020000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffffffffffd, @mcast2}, 0xffffffffffffffa5) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000000)=0x2, 0x4) listen(r1, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000040)=0x4) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r3 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) sendto$inet(r3, &(0x7f00000002c0)='q', 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r3, 0x10}, {r3}, {r3, 0x40}, {r3, 0x100}, {r3, 0x20}], 0x5, 0x0) 20:49:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="4b43ad65ab1359d2a27a874d6d470c43f3ee6697b93831d8d909e1057076b1aa6756c716cb3262912afb3b46055203f2b95b2c6d3518fb8987226958e9365c4dbcc8b0d723acedfd948046dcd3f488b64283666ade9fc45a6875d544650a7278b4198da4c889be0134f5fef726fe13803ebab82a25c5b10765579b82f1641f20b40911fc6b531712e9309ae10977c4cc0617ce5ce684"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:10 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="92065c83fc1fb45deb109b664d81f312271e2b2c3a665cac6fa4856f1d9c37204ccdad252042cc44d2fdb0a018073447394960add93a9732da54c8085aac31ae5bc266e89121c29d22606c986915a28ad3f674"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000380)={0x5, 0xfffffffffffff67a, [], {0x0, @bt={0x23d80206, 0x9, 0x0, 0x1, 0x1, 0x0, 0x94aa, 0x4, 0x3, 0x6, 0x1, 0x3, 0x6, 0xfff, 0x1, 0x2}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000002540)=""/4096, 0x1000) 20:49:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @dev={[], 0x10}}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x3) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:11 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r4 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0x0, r1, 0x0, 0x3, &(0x7f0000000400)='9p\x00'}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) r7 = getpgid(0x0) getgroups(0x6, &(0x7f00000013c0)=[0xee00, 0x0, 0xee00, 0xee01, 0xee00, 0xee00]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001e40)=0x0) getgroups(0x6, &(0x7f0000001e80)=[0xee01, 0xee01, 0xee01, 0xee00, 0xee01, 0xee01]) r11 = getpgid(0x0) getresgid(&(0x7f0000001ec0)=0x0, &(0x7f0000001f00), &(0x7f0000001f40)) r13 = fcntl$getown(r1, 0x9) getresgid(&(0x7f0000002380), &(0x7f00000023c0), &(0x7f0000002400)=0x0) r15 = syz_open_dev$sg(&(0x7f0000002440)='/dev/sg#\x00', 0xffffffffffffff7f, 0xa000) r16 = open(&(0x7f0000002480)='./file0\x00', 0x8000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000024c0)=0x0) fstat(r0, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getpid() r20 = getegid() sendmmsg$unix(r0, &(0x7f0000002cc0)=[{&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="746bc0b933a550f5610ae617f1d63e35c28cd7088cac7781c2a83e5906530bda4edf79f78882", 0x26}, {&(0x7f0000000740)="455bf3c9ba3cb8c1376a34b4c747c0c00dc82e491e4f4c50920c8502af59dccaffb0f2554cb5a0f626736cdbeffdf91f30e2370582b11e3a0a0f4826b54ca2b6ea3ddad5578d5e6ed4d4a2d9ace6ee5ec43d4c38af16784e895b1bea1065d2f64e68776dbe34a0a8c86d5a6122e334f49a99ca299c88e1a12ee006d689fec0491f68618fbcf169fab1409fc637a86fe21196b7669d1a9f8cbf2e7a", 0x9b}], 0x2, &(0x7f0000000b40)=[@cred={0x20, 0x1, 0x2, r3, r2, r4}, @rights={0x10}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r2, r6}, @rights={0x30, 0x1, 0x1, [r0, r1, r1, r1, r0, r1, r1, r0]}], 0x98, 0x4000000}, {&(0x7f0000000c00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000c80)}, {&(0x7f0000000cc0)="f1ff95044dbc5310a5c5b9c91a138713c5cfda17fa1f8636c5fb589ea5ab8a20a3195ba4fcdeb13d20225e442850b48857d38d2affc0eb5915eb7d5112614cd63ed13d6783d4e50c3a80058616b7e9ad103e6e7c71fcf32a34bbd42dff05aee66b9da0f60a21dc2445f4322f812b9c9680eb64", 0x73}, {&(0x7f0000000d40)="e1e5daebfa57e0dce2ffbe9b2d6a85c4ac2154f5e33005bac0e25fffa9896c21f31b14fe825def9676756c81f5065bc74811af8ef2be202ccddd6e729439d7f728f4ee18c86368d0c7db78dcaade45b99dcbd3d94338bad599feffd6c0f90ae72a2ea9784eb041b6fde7e8822e19021f74c1205cdfff45f268dabfcb8130c595ba4d9db24731ae51484c5f3a38184bf5d5bb1e276209bae48f06493034589025c5dfbc1d467b71586d8e67d0a929f673160eb97b0df3e4019e54dae0d21cdc6613650567e2", 0xc5}, {&(0x7f0000000e40)="7efda6a61fddbd0c45ee086fc74751c354a122f471338ef640c1fb377925b7f8efee2fc25ca887814519df805e8a183cdf833df8fb0fcadec3b5d02be390f3be78d5469764b23df9e1cbf53fbdf0a6485450bef23bd532f31e0e443829d8cb9f85e97ee7e14bb74c27caa413becc7d58f706315deaefb89b670f4858fdd4cfb7e4337a891121f90672cced45dd978ca62e181a06bcff09c70c7e39ad81a3f193f6e01ce4e809eaf57b8a59c25fc3e139bb75ae8761a99bff6b7bfef954806bc65e7f77fac8e5ebca6e3b1202944405a03ca25c81a15e962b163d42d205d025cb60fa117bdb415d2754ad9f7a696171c576", 0xf1}, {&(0x7f0000000f40)="823d38a0c5d611eea35ef18635d097dd1754b9502b9305a514dce78531d0104b8654f945851d5ab01fc5bf653645a1b8f8bef0e107e686b40194393e0cb4be09d957c80db70a15371f0436a35c839d999df8ee7b1ce3d82f700be0a847cfa9d3c163732952f7b77291cf52f21e9321fb59bfa918ff598e49be3f90b44c9628ed645347ab765b867941bed12b3f62a4d254f51094c0ad037a877f006c4d641fdf3dafe7dbeb4cb7e89dbd736fa5ecb4477041c3b5e960741dde875eb27555dfc66e542ade109089dc204f5958ae28f6a38dbc71e4101b09f0b775ad39a4cdf10c34a0dc14be5d53da66fd15cc7bb57f075fe7", 0xf2}, {&(0x7f0000001040)="ea17850abfa5bfc960d1d274e6288755fd25ee2baa176eac5ee14b0b855dad62e633f0eee8515a60f59c190edde9749dc9454dd6c22e2fd2910a4863d249ce00a345bdbadaaa4e6b8075d61188e3b6c1c304cd3072eca6cd74856832cfcbdf1c7086232b0406d5f737636fb6795e01e1214bbb4dc1fc5fa5ed75c9b07f70b9175b667fbae293a6934187932fe7b6ead9fb90086e753880a37c588495ebd48dc555dce40359fab0af7c5b9fe21fd4d44a91d8e60b7b3e784294fb83927aa9c9a6e18b75d94306c8bf63deef1ca335e2c42d999ef5a926e39bf43cc01126a152a8b4a348a89da7515fdf86e1934558d8f3587306c5872d", 0xf6}, {&(0x7f0000001140)="56032e2da64fe1aca23071f2a343e595bb3b0669af24b230979928fc539c9f", 0x1f}], 0x7, 0x0, 0x0, 0x4}, {&(0x7f0000001200)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000001280)="5aafafd9d8ef65fefaa758afb0ccda92db636bd22e12aca7f9fd600c43754a8de0a50b497dfb51176eaf3863613e6d2ea1376205e96708a56b7090b62d5f29811c8b3ba68f157ac36fca8a95e7c6609734472e2fb539fc1eaac4f5d6720c86447947caec35fa7f521fc9bdd060b0919ca7", 0x71}, {&(0x7f0000001300)="618631db5ef98b97da8dfce83afc57334d15f898d09bf0b722c049f2eb238548ec68bde705a3fcc05e541c452b36245be05e38af", 0x34}, {&(0x7f0000001340)="3c527758de865e7379c4e1a01459d117ae2e2de40679c9e6b403b1dad6a4da1885f7d3fa86c5f47bf68cfe94b31609929b999440", 0x34}], 0x3, &(0x7f0000001400)=[@cred={0x20, 0x1, 0x2, r7, r2, r8}], 0x20, 0x80}, {&(0x7f0000001440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f00000014c0)="1a4f703740f60535894f6918460fe4c1e734728d0219d276e91e4e12d277eb3143a82357ade36754db349d23c56419c039fe9dce6778c5981b2fc660efc8b24a620b0b0835d68a81d42de004884e81babac9b901a63e16fc1dfdb800ee0ff48f96bccb72f6d27c1203de0d", 0x6b}, {&(0x7f0000004680)="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", 0x1000}], 0x2, &(0x7f0000001580)=[@rights={0x20, 0x1, 0x1, [r0, r0, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r1]}], 0x40, 0x4000000}, {&(0x7f00000015c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f00000016c0)="1ed7797457f7637396d28285357ffcb29ea26c35b96424b4aa945982b1b4efc49db7022e023e81e79013acaffb0ebfe7314cbb327d05d4c39bd13e5cc2b53938f569e07bf16ee7e4de296c57a1ed70af6ecf93a329a5f60513f55e19eed2b31de9b69c2062650a08e8b7dc", 0x6b}, {&(0x7f0000001640)="3110012b78d087dd9ef84481a3d70debd40128740c90c0c22ae18756025a6da02709cd7f5f0950a5ba90c2e4c63e0eff7a371706", 0x34}, {&(0x7f0000001740)="f65ab1c6e926416be2c832fabe0a590bcc6969160e8251628dfb72a3f94c684439a6e3ebd96bc8cec3b67bf052c937aefcdcbe819c201ae6eb4b81fcdd6ee70c24e57d06bdef91a13ac67c6d1c0c446ae01d8aa790c1c8dc1cbec74a30bc20cf0a96532a07037cbf36f4185e8181bca0dfd22e158f12a4799dd3c6a0316865a97158205eec6288b31114508cb5e50042777b8cb4746579fa2097173612e4d05c913a219fbb95f61467321c50818133920358fdf93aecfd1afeab504d217ba7dab3e8d1e419a74605f60007b8958b0935143fc6", 0xd3}, {&(0x7f0000005680)="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", 0x1000}, {&(0x7f0000001840)="197ff9df6e761e4db47233c7da59e8874b8c644f3734f82bb4bd980d5ce5f35aed05b96c6dc90f12a4a43873b954844fde7d85a577c041f3b56fe26a76ac6303f1d5af5bcfdf2f3e84d8e5bfb1428597affcaeeb5756e16e6fdf15dd315e8e2ef189d104876db9350b46", 0x6a}, {&(0x7f00000018c0)="473096", 0x3}, {&(0x7f0000001a40)="db8192675acebcb37030fede0ce68afad734ff546a15a34541bb2b63252b562b6cde22565ffd635cb3f6093ed43b639f05bd8d20ffe5fbd088990c2160b5d5e956295c916d4beca2764a9bb340d71803c47eef1a60ad9ea40fbd35b37dc84c3a7ea5fe036ee1f209b05579438d7b99a8034619", 0x73}], 0x7, 0x0, 0x0, 0x4004000}, {&(0x7f0000001b80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001c00)="a06c69ca", 0x4}], 0x1, 0x0, 0x0, 0x20004845}, {&(0x7f0000001c80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001e00)=[{&(0x7f0000001d00)="ddb2f903d151ad35d105454b60c595131feb54e03872b54f3246d629378a8bb0951aed0680024d9719356a06c985617fc8f4b1975a4a1d1919884a267785f7966db87f8566930fa28e957eadb185fea2363709d7f432dbcbf02420965158c892cc87d17e358bd807bfe8b82901389b00b3c9fdab", 0x74}, {&(0x7f0000001d80)="2aae29033393054cd98cf997ecfb158bbe45e7c17300d92a1c06", 0x1a}, {&(0x7f0000001dc0)="8fc0db412a9f9ca13fad0359c7a8250c29717de7b5bdae8564f8", 0x1a}], 0x3, &(0x7f0000001f80)=[@rights={0x20, 0x1, 0x1, [r0, r1, r1]}, @rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r0, r1, r1, r0]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r9, r2, r10}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r11, r2, r12}], 0xf8, 0x4000000}, {&(0x7f0000002140)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002340)=[{&(0x7f00000021c0)="e38fb33730e3db065cdb2a69f0a476f06489aa2fa473826725d635c54471d033e3e220dedb590f7fdae625ed18b49cba6ceff2a340ed4a44924277a14a09cfb6f82c00540d7b8bf425a7a2ae3118e4cc359af7c5b39b9f90c6d5c879dc8c6a9bd93e36ce9cb3aaaf7dc0c30fdfb5377451c9c44d1c1c8d0dbc3b5415db116b800b6b8b267ca21e811c7a046096d8527c97c4bf8c0e53a50f890653", 0x9b}, {&(0x7f0000002080)="17526e279e42", 0x6}, {&(0x7f0000002280)="30ab7362cb28eec731941350eb3d55eabe0708632da9980ba40d62c75b2593aa29fc51e0588e5e8eabce3b79c7f9c7a482fce759fd2243bfe99d2fca5e5664e07f8d31e89d955b6ee1fa007f7288f79249c7813d8678e87315417b56b0eb802a53864da8b16227172620da2621f0af6942996c7db8fe", 0x76}, {&(0x7f0000002300)="75632ce166ad4b769a01a225e96408228bac75ec65add7450ab3eee4d6d0de9df207efa66c3d9800", 0x28}], 0x4, &(0x7f0000002800)=[@rights={0x38, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r0, r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r2, r14}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @rights={0x20, 0x1, 0x1, [r1, r15, r0, r1]}, @rights={0x30, 0x1, 0x1, [r1, r16, r0, r1, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r17, r2, r18}], 0xe0, 0x801}, {&(0x7f0000002900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c00)=[{&(0x7f00000025c0)="d3f98a2b0a21f4c2a15ba365c6897b2c8747ebdfb4ce3ce0adc9c70f054f276a93d37df1", 0x24}, {&(0x7f0000002980)="782e720beb78f76d51218df874dafebf396579c88e8d87491779e920f16f7c367028abc462331a568b0ce3f06e518e5c71104cdc0586665b64eaab108c69ba745786419aba46e8bf2e6948a88b60c015a08d392c6eb8be143c4f22d76d5647a85fe606f00a69c6e72bea5b0724cc1d6d69ab30fa55d0f4265fef9503bfd6b3", 0x7f}, {&(0x7f0000002680)="15300b1654", 0x5}, {&(0x7f0000002a00)="d1b942b769cd99ebf920c3c4220251502de79680dcb60d95baebac2a0d2a18baf8127e81e41107e1e6213615906d0c3542b4cbaec516343c629272e3ccc49983f3e428180700f30a8ad57de7304104c083caf6251ce2d899287cc7015dbffbb37ec7c5a4d11bbb6724588abfc4abbeeb71e51aa91225a1c12d56f9f7a3e583d874ce7d70dba276", 0x87}, {&(0x7f0000002ac0)="8d28ff6f56c437ce74cb8be93f64b80015373ee9702fa00afb18906ce5d96b4530dfeb19c4dd3459549b32f509bc86e6dda7ac50bf6d0c37bc02", 0x3a}, {&(0x7f0000002b00)="2fcc4b4ea92bbe900c063baf7a072c53398d2fd9dbde896279b1de1c73e4954cc8", 0x21}, {&(0x7f0000002b40)="70515bdab7cf0267dccaab521fda809b6cc30e9f8c98dee057d42af867d9372ab28f21756d233fd6176aacc33318393d8df7a26e309183da316437c8d7f88202623e13b9ea44cd6a374eefb13c61ee9b80e8156737b6e29a65a3207de687b4d77b5f1c2101fce501da9666eb5791f9e2a42715ede0eb78802f90931aa6cb4e295b40c53c766d401fc9590df35298e5ac3ac6e29a058e82670d5dd95788c0ae5795", 0xa1}], 0x7, &(0x7f0000002c80)=[@cred={0x20, 0x1, 0x2, r19, r2, r20}], 0x20, 0x20000000}], 0x9, 0x4040000) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r21 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r21, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x1, 0xffffffffffffffff}) r23 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r23, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r22, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r24}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r25) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:11 executing program 2: 20:49:11 executing program 2: 20:49:11 executing program 2: 20:49:11 executing program 2: 20:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:12 executing program 2: 20:49:12 executing program 2: 20:49:13 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000440)='syz', 0xffffffffffffffff) 20:49:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000001100)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}], 0x1, &(0x7f0000000d00)=""/210, 0xd2}}], 0x1, 0x0, &(0x7f0000004840)) 20:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:15 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r5}}, {@mmap='mmap'}, {@cache_none='cache=none'}], [{@measure='measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, "2ecd2562646576"}}, {@smackfsfloor={'smackfsfloor', 0x3d, '127.0.0.1\x00'}}]}}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:15 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x4, 0xcf, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000a80)=""/207}, &(0x7f0000000240)=0x78) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) accept4$packet(r4, &(0x7f00000003c0), &(0x7f0000000400)=0x14, 0x80800) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:15 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) socket$rds(0x15, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00'}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x90, &(0x7f0000000540)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x10001, @dev={0xfe, 0x80, [], 0x1b}, 0x8}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x11}}, @in6={0xa, 0x4e24, 0x5, @loopback, 0x1}, @in6={0xa, 0x4e23, 0x6, @ipv4, 0xffffffffffffffff}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r5, 0x6, 0x80}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) recvfrom$inet(r0, &(0x7f0000000740)=""/157, 0x9d, 0x0, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000300)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4cef92427b8b1450fed8ca8173b6fbd3f9f43d02907d0b1ad9e6d26778cff5251248e9eef250c848f5e820de218decef3f5be4747b34d2430e46ccd832b12ad2b5b08ffb1701e8668f6df54a4b1d7f2fbefde58bd3c3a"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0x48) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={"6c6f004000000000000500"}) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={"6c6f000400000000004a6b00"}) 20:49:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) readv(r0, &(0x7f0000000000), 0x0) readv(r0, &(0x7f0000001400)=[{&(0x7f0000001280)=""/98, 0x62}, {&(0x7f0000001300)=""/71, 0x47}], 0x2) 20:49:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20100000008912, &(0x7f0000000140)="0a5c2d0240316285717070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x42) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x389756b1353686c0, 0x120, 0x0, 0xffffffffffffffeb) 20:49:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20, &(0x7f0000000240)=ANY=[@ANYRES64=r1]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x6) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b7"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) write$binfmt_aout(r3, &(0x7f0000000a80)={{0xcc, 0x1, 0x1ff, 0x366, 0x2c9, 0x7ff0000000000000, 0x2d4, 0x80000000}, "1ecec702ecc8496afd15f2699987a5b79ae136b7bf90a64704fc3b76b84d9b4b26931692cb2c6391a3f2bb3f9d6aa72f52e47854bd05a678651bc882f85ce59e29d59278783685597f3588ebc103da61eeda74cefb3da8d218ddb959312c249115ba1b339223593ce19ab71655f2410105f81afce36d669974d2df4ebaab13e913103ca2da6307cf163b317f70e638c7ba32980890cf65190312f0e3bd1f4878d4cf297e8d8f1252ef5761686e7a79f7dac6cfc8e0c3b56d4117ec7a47a19779a44acd17", [[], [], [], [], [], [], [], []]}, 0x8e4) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:19 executing program 2: unshare(0x2000400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/cgroup\x00') setns(r0, 0x0) 20:49:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000180)={0x10000009, 0xffffffffffffffff, 0x1, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sync_file_range(r3, 0x4, 0x4, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r4, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x10000, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:19 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r1) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:19 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="b0bd933e0d736ddcee1b9f09fa2571e5316d5352813395d2da8908f27e5660c3eaa5b2b003e9f6d6532afa66c953c18df7692bd9c8f8c8b7bd2e61b447f5d88d9fab3d2a35792f5849c52c83b778f045283c55c9f115d60b700ebdc5bbe0aaeb588f635a4d4af46b181ab4c0c81ef80ea6c53b7e16aa517d1c33b0edef9cfc22e09f670bd74b9efb4ed108d067e53b268340ae2a41c542"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000000c0)={0x77359400}, 0x10) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000740)=0xc) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x4, 0x8001, 0xdfbe, 0x452a, 0x0, 0x0, 0x48000, 0x1, 0xfffffffffffffc00, 0x400, 0x80000001, 0x1, 0xbde, 0x2, 0x4, 0x40, 0xe9, 0x1, 0x8, 0x9, 0xe01, 0x2, 0xfffffffffffff800, 0x5, 0xf6, 0x10001, 0x0, 0x2, 0x6e4aeda, 0x9, 0x1000, 0x2, 0x7f, 0x8, 0x5, 0x1ff, 0x0, 0x3fc, 0x3, @perf_bp={&(0x7f00000001c0), 0x4}, 0x88, 0x5, 0x40, 0x2, 0x6, 0x8, 0x4}, r4, 0x3, r0, 0x8) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:19 executing program 2: 20:49:19 executing program 2: 20:49:19 executing program 2: 20:49:20 executing program 2: 20:49:20 executing program 2: 20:49:20 executing program 2: 20:49:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:21 executing program 2: 20:49:21 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x206, 0x4a, 0x48, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)={r4, 0x41, "64ef27602a177349bc2fdb8e5bd3875071a7ac704ff4ad011e8147e1cbf4da13d019f11a9dce589be8a7f0a8edd4d7f8b1616a659fb2a7bc7e9529befe77ddd9fd"}, &(0x7f0000000180)=0x49) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:21 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0x9, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:21 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) semget$private(0x0, 0x2, 0x500) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20002, 0x0) syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="aa5f285f07ffaaaaaaaaaa22302953a98186dd60b4090000301d0002880000000000000000ffffe0001302ff0200000032140000000000000000000001210090780003290060b680fa0000000000000000000000000000ffffffffffff000000f9fffffffffffffeffac14"], 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000240)={0x21, @multicast1, 0x4e20, 0x1, 'lblc\x00', 0xc, 0x4, 0x47}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r1, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x2) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r1, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000300)={@multicast1, @remote}, &(0x7f0000000340)=0xffffffffffffff3c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0x5, &(0x7f0000003680)=""/4096, 0x33) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000008c0)=r5) 20:49:21 executing program 2: 20:49:21 executing program 2: 20:49:22 executing program 2: 20:49:22 executing program 2: 20:49:22 executing program 2: 20:49:22 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) 20:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:22 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\x00', 0x1, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0x8) 20:49:24 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="9a0fae08d65c7b0b8b366b54ec3b42aa6841432e82c5cf595953a24043b9a7dd"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz0\x00') mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:24 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:49:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000140)=""/113) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b7371b80042131a86d0a82953449945426b221cf0d107363e7554c45e5e99a86c58a504647bebe1d14751e195b2324391b8ce1c90c6a4f7ea0ee95d35569d4ebac989070c322b699b828cddc244b8987676c44672a6e5eb4944754b818d8971575d22983135267c3f00fb384e89aa5b2f678c58d22b37c3d24455e23204754362d9c7ac8c78e6dd30688a0f52a570b454577a15a2073348e2f3a1f1284e36df91d1e23981bab12d1ebb0024682e86f42e244bc63e967032256d69c8375a879cf6e3d54222ae2068f211383eb29caddd8ebc68415ac0e591dc910a46e6ccf54ddf3ea3eea7e7bdf5756a57a530eecd660e86727be422f8f7521ff36"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:25 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xe8) modify_ldt$read(0x0, &(0x7f0000004680)=""/4096, 0x1000) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f00000001c0)) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001d40)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(cipher_null-generic)\x00'}, 0x58) 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:25 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2601, 0xffffffffffffffff) 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @rand_addr}, 'bond_slave_0\x00'}) 20:49:25 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000980), &(0x7f00000009c0)=""/37, 0x25, &(0x7f0000000a40)={&(0x7f0000000a00)={'cbcmac(fcrypt)\x00'}}) 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000000)=ANY=[]) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)={[{@index_on='index=on'}]}) 20:49:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x0, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x4, 0x20000) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) [ 1265.071446] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1265.071483] overlayfs: missing 'lowerdir' 20:49:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000240)=0xc) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000300)={'veth1_to_bridge\x00', {0x2, 0x4e20}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) accept4(r0, &(0x7f0000000300)=@hci, &(0x7f00000000c0)=0x80, 0x800) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$NBD_CLEAR_QUE(r0, 0xab05) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)=0x6000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x0, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000500)) r1 = creat(&(0x7f0000000180)="e91f7189591e9233614b00", 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) connect$inet6(r4, &(0x7f0000000100), 0x1c) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) 20:49:27 executing program 3: r0 = creat(&(0x7f00000000c0)="e91f7189591e9233614b00", 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000100), 0x1c) r3 = dup2(r2, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x3f8) dup2(r1, r0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x0, 0xffffffffffffffff}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) syslog(0x0, &(0x7f0000003680)=""/4096, 0x1000) 20:49:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001d40)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(cipher_null-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) write$binfmt_aout(r2, &(0x7f0000001dc0)=ANY=[@ANYBLOB="070188ffbc0300000c020000ffffff7fa9030000ff0f000000000000000000002028"], 0x22) recvmmsg(r2, &(0x7f0000001a80)=[{{&(0x7f0000000f00)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, &(0x7f0000001d00)) 20:49:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392ddfa9b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x80807) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000000c0)) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000240)='./file0\x00', 0x5, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000740)="3f15d769377cb4af3f5ba79783824642156b907300adbf9e03d0a52a0b3f3afef4e660120419eed473fed075946deb83a9a08b74263b037e153088ce65ab5b2cdf0ee596a251105f895cb7308de5c2b96d7bc2914d47afc731cf9e70f6d5fb33999c2cab9bd1b624acc8117803e4e9aaadd496e4d59617d813d254f7affda7894c22bf66b365ecd20deddb1f1b5fab3ef8be81a5a8", 0x95, 0x1}, {&(0x7f0000000a80)="e2cadc43dd1edf58873d062c04dcbf1195eed2cf9623c991ef1292dda2935e4b8a844e43017789f4adce89160bc5edbc6144ed1ac89c138ccccfd97df099a44e159b6f5a59d81de4978ac8d517088bb234e75f8fc2a233fb932f7d0aa9da9b992617d9dcb177a34e026042509d007e97d8a4c3dadc87d396864bf2d3c99b7fccd09e0f280b21d5dff1a19b5572583a7a16b7d7cb6fb70817acbd42bb880846252dad4583991f72b4f7398d6b4206403b524e4601ded586aa24c4048d9dada11553ae2d16f09a183c5914d51d9a38573f66212d0779de14ce06bc45ebb2dc02318a87c757a4cbf3b97df14129a9ff82573e32e517cb2f667c", 0xf8, 0x3}, {&(0x7f0000000b80)="77a29008240d67fcd5c8d3281c3a617232e40b94ba1bc9e4646d334c604aceed647f01be26ac890d077c6e8d7234f938d89e997125a3e9dfb0b2effd198b2dc4242359b9304a257b65765dbd20e6a624bd2a39e7f8e1c045614bc1f92613146d8ccbdea0ee0cab15d0a634774d5b06efa8e3e87fa4eafacc5559dfede36bfa39637cf38ff181b78a715b338f912fa0a6d2c594753821d007c619b23bcc6f1e3557a289f976dd39a2ca8a33d0e70e8dda374ce98faf1575beeba1fb91a8003e581f74dbe4", 0xc4, 0x100000001}, {&(0x7f0000000300)="e8444524989af04282800e19ea19b3d8ed3f62627fa11f21eddaf119e7f490b9e98351979e760a71f72f3f19f58170575a31cde7039a5ec525b0c608cddafc564cac9551", 0x44, 0xffff}], 0x1, &(0x7f0000000c80)='9p\x00') mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000940)=0x4, 0x4) 20:49:30 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) getpid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f00000013c0)="4a538548a8f48e8317802124bd97e8b279cae336df5fe0945a3fd0f1b24af91d48f4eb9914c64ee2e24b5e309217c0b9b5adef1bd4351c540c51145c3164b9c1665bd09deae8e2d2b65d78c04b1ab40e6b2720e84ba643ede3a8f4a9f97a597d66a36dec7d167042f6929f4f379d8082642c56add4248cfbc73285ce2eff6378f73fcec216799d57636f7c5eb41bd3f2122b0ddd18e68a8adaf3da3fd7834801aefc26c52cc515dbbe9a9b23"}}, &(0x7f00000002c0)) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={"0200"}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 20:49:30 executing program 3: 20:49:30 executing program 0: 20:49:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000300)=""/99) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) creat(&(0x7f00000000c0)='./file0\x00', 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:30 executing program 3: 20:49:30 executing program 0: [ 1268.945069] Invalid option length (1043602) for dns_resolver key 20:49:30 executing program 3: 20:49:30 executing program 0: 20:49:30 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) getpid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f00000013c0)="4a538548a8f48e8317802124bd97e8b279cae336df5fe0945a3fd0f1b24af91d48f4eb9914c64ee2e24b5e309217c0b9b5adef1bd4351c540c51145c3164b9c1665bd09deae8e2d2b65d78c04b1ab40e6b2720e84ba643ede3a8f4a9f97a597d66a36dec7d167042f6929f4f379d8082642c56add4248cfbc73285ce2eff6378f73fcec216799d57636f7c5eb41bd3f2122b0ddd18e68a8adaf3da3fd7834801aefc26c52cc515dbbe9a9b23"}}, &(0x7f00000002c0)) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={"0200"}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 20:49:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:31 executing program 3: [ 1269.285326] Invalid option length (1043602) for dns_resolver key [ 1269.302841] 9pnet_virtio: no channels available for device 127.0.0.1 20:49:31 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r6, 0x7}, &(0x7f00000003c0)=0x8) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) setsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000a80)="ba527a2d312b801c74ee7a23e3f5f8a859b79aa86a0e578e9443574035b0802ad4eebb6e35efce113eb49e51e28752d4fbd0693e0119bc18113536f9073d79c2aa26014f25c54027b8c3c14ce44c2ea87ed631c438b5c00cea4dc50919ac3ddf671016c3a7c3fb64585fffba866e253027ba781a576c8ed9f6f29ed62ab019c130a87f44e4f9a4916ae4375383ecb25e9a6d1f36499b3c9aac5aebcdd2679904edc1e9ff8a7c3a10b80c525ef19435924319388b35e6b90d6b167a3b7b100bd42b8dd17711c05036eefcebd4e0bdf0a0c6e1301abc5dededaedf192fe38fb76f", 0xe0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:31 executing program 0: 20:49:31 executing program 2: [ 1269.611501] 9pnet_virtio: no channels available for device 127.0.0.1 20:49:31 executing program 3: 20:49:31 executing program 3: 20:49:31 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000380)={0x5, {{0xa, 0x4e23, 0x7, @mcast1, 0x401}}}, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:31 executing program 2: 20:49:31 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000140)='./control/file0\x00') rename(&(0x7f00000003c0)='./control/file0\x00', &(0x7f0000000380)='./file0\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) close(r0) 20:49:31 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000300)=""/21) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000240)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) accept4$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000740)=0x1c, 0x800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r5) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000001c0)=0x1f) 20:49:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unshare(0x2000400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='%]*\x00'}, 0x30) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 20:49:31 executing program 3: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r2, &(0x7f0000002400)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) 20:49:32 executing program 2: r0 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000080006c6c4a441bae"]) 20:49:32 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000000c0)="4f9119f4562ed08f579f00604a099a6742879b48deef25672ee1db6a71559980b2520aeaceca") getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:32 executing program 3: 20:49:32 executing program 0: 20:49:32 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000080)}, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x20000b}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 20:49:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000080)}, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x20000b}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 20:49:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x4000000000000347, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xfffffffffffffe52) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 20:49:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)={0xd, 0x75, 0x0, {0x2, "dabd"}}, 0xd) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:33 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) 20:49:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000001c0)) 20:49:33 executing program 0: 20:49:34 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000f40)={0x0, 0xe5, "2bedf1b7bae2fb1aceb2f3d96a81c441164fde4a125a84f0cdfebb1ed2f76b12ca8275f4a598daaa56d493ff84fe6fcc34fa8e26c32b478283b8807608f16c453818226daee4ca7981839eb4b6adf32b3adc63051c3c55bb0294751234be0a912f951d325bcf63524b18e0037b5bab59e2db9312e1810db0a4bf9d2f027c4cba10efd005016937355c9e32ba8e3c402c2c02e8724d02aa8c158925462ea748bdfbd42cc5551921701b4592a7243e524e480c6e8c450139f51501fba433c4147c8b3654d22c803c154fe6252a6e320095327010e07c8abd33aab8ccbbee9cdda819d6b0cc41"}, &(0x7f0000001040)=0xed) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001080)={r1, 0x5}, &(0x7f00000010c0)=0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r2, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"]) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r6, 0x2, 0xffffffffffffffff) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r5, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r2, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', r7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000800)=0x9) 20:49:34 executing program 3: 20:49:34 executing program 2: 20:49:34 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000002c0)}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x20000b}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 20:49:34 executing program 3: r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x20000b}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:49:35 executing program 2: 20:49:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000300)='0\x00') 20:49:35 executing program 3: 20:49:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)={0x9, 0xa594c7a7a689a6e5, 0x5, 0x3, 'syz1\x00', 0x8}) 20:49:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="56388cd63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cb65c2ce0caba0c874e5e93bf0ffcc93a135a3969639fca1b3d8ec62a9b5069c874e5472d05c1c6a30552013f283a6e52d309c086c5a5bbb3ee809685c5cc9987e3dd15eda4ed4f5ab1407fc41dcf0ee51480dee5e1ac26d98ce0c3cc2f59ba256df4985ecbddd16b8feb65bc2188d69db3dea309526e4b9b4e47cf406d1e4dbd4977cfd4cf0b2ee740db4aa0f3322e0ee20393ea8f5ae0f5ca29414469fc42df6e69ab3abd38dbe1b311b7084465570"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x2) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x1f, r1}, 0x14) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:35 executing program 3: 20:49:35 executing program 2: 20:49:36 executing program 0: 20:49:36 executing program 2: 20:49:36 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000300)=ANY=[@ANYBLOB="0400000000000080ffffffff0000000000000000000000000800000000000000cc00000000000000ffffffff00000057c1e1c044aa99ac0007000000000000000500000000000000"]) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'irlan0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="35000000000000000f0000008b92922a0ddca450416577eae041a047e84d6d7188fffc18a9f5997b63c596aaa389dc01000000cfb1311f79cfa57a203cb67fce45915b1e9f5808f4ee830bb5f3ddca4c2bdb1686e0000001ac1414bb4e214e220600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080003007f00000000000000ff01000000000000feffffff04000000000000007a7cfdb40f6196c63f271dfc29be9cd1a515d45039a8e5f109cbf7909031e4e98ca6"]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:36 executing program 3: 20:49:36 executing program 2: 20:49:36 executing program 0: 20:49:36 executing program 3: 20:49:36 executing program 2: 20:49:37 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="fa56272d31fd572613fbf4208ca814891877784fcfa621adb3a302fbb2b0"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) write$binfmt_elf64(r2, &(0x7f0000004680)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x20, 0x9, 0x5, 0xc4, 0x3, 0x3, 0x9, 0x39d, 0x40, 0x220, 0xfffffffffffffffe, 0x3bc, 0x38, 0x2, 0xffffffff, 0x10000, 0x80}, [{0x7, 0x0, 0x4, 0x1000, 0x7fffffff, 0x7fff, 0x7fff, 0x2c}, {0x6474e557, 0x100000001, 0x7, 0xffffffff, 0x9, 0x6, 0x3, 0x6}], "b72db850c7b5be033c821d0d9ebf0d34c6f593b8446f355c3430b51269bef4a7f205ad1b2baa7a8b544aa1473d86fc04aaa58590ecd954bb966267ade437bdbf5bded0a5e234c06da913e040f24354cc7b58654cc3da0172d8b3fc16fbc1bf9546925911bcf09dd9c68613b58c3177ecc3dcf6b79fe250af0d5a947e99a53ac1accb37d9a0e2dcca0c865d5bb7f0632c691fa81582ed821bc678475f7d0b646892d23207075897d2f1e3f70a233b1d08e2724bf8818e77fdd25e7b1c4231911399e9396d847c9a76328c40ad3fbc8670cdff4d60fa90bd8e048c8fb3d6777cee29ae053c3657a6e337e6ffc5b9b34a14f4e2d10ce1532ffaa8f2f03e9604bc9030fb09c7bd18cc7075fb3c2b412657000c775d528b6dc0eafca59fe91621aa476bfe6145e9ca9ca4c0b682cfcd29e059977cca5010eeec94ff949dbe8537d156aa7621de61542a840434d0a2a88c9a9af65920a173381cf70f2926aa21aa7d9a0386400e53c1827c3e61bd0ee99fe7b4a90acefd515b63c318f3b8100cb345f3e1e3689f68d53c26d73150de928ba2317f2edfc0f1175b2c9ab3a70a0e5bf25edf222fd7d40148324ee751469a9e3308859f5fac3b1bed227e9d46fb63c751bc3cba080e6785085e75a3e5e823af91b1a49f76c100c5810b642d1b927412dc4b7da1dd23fbe53cb83cdaa505b12e702f84eabd675258c49abc19d3779610f1bd6e59e9ee8ee5ac65cca86c72601c820f185d6a7b580da28bec52d204c76d18413090b5a3981790e74aa6fcac511bc775200a43a542b84c18e32c0a3cd0c40e86fe3631d2b946522abefc500f811d9db83a2bd61b0470a110c1b24114b53f5051c7aea9e857313b597a2d37c56a2fde438f963f847d891eb6adf37326ccdd46dab95625faa8cbe7b70eb93bf69609b7f09967735579bd91d2893edf3416504afd0f50d4c2f4b28504407bf39a4d63276eb7446ff3b1d67320e54bfe4d0859337a9bdfb11b9cd9f5b3a99152d22ddbb415993371a7f1b73415b809217f8d5d703e7ddb7817a4dd908d92c288d383d83f456b26b75f117e0102318339231115970202b7f1c5bfea2ab67eb323f7b2b419d42fb9516a7d05e27ec448c5aea3f1301cf852caeff7f384d4172cff12c14edee6417ef1af3356a69573d959d323ce09f024264779fde99b83fee3f2c3ef1bd80369cf421225e841fa1cae3ae7133eadcdb444f29333d1e1160cfdde833b0c405cc925013555171c38ff19164ee614774a42f1dc284f1a2ede6d2fc3414fad37de5684a735e89460e64cab78c12d685f6266ba46d5a9a342960659e087c0b0ea415630f147fa11a9942e67251544cbfd2af4f753c2b53452b281a35ae7edef0ddd8469dc0277ff9c0da761a25f8573cf96f902d2da7d2dde0b4708e7b40a2f8ef06c5d9c6a2fff092a4139cd972e76361e689afd8c6159b050ea83c9d3c1441e1da161632de0ac0ca853c4af87bf0471558e37c8b9ef85645721aa30e85d35a3d4bb6f13cab578ffe90233bf74259e995c881ea2ed95700fe26f18df0b0293fe8edbe18d9ad1c184589dd25b89d3e1d8475d52bed1f7d14e0da389219a04964dc52a1ebf4ba1d55ccd69de02a5f1544e70ed7ec89a4ce6ff66defcc56869ad89985585961fe19b33110b776b94055e3435148756617c3bbe1fe39cbbfadeca209a8d3cd54a464ab30348486e96c71002b2ef00194979366b23c1662c9045230e8dc1347bd14cd3eaffa6f5ca26c533cac734aa6484ce5eb7aac7e35739683d6368fd6d574b970e00674a263dfd05552d9e40411f911cb4044aa635d31afb55e5ee62d78eaf62d479969ce8d0d12cf5beb9fc537c0006d660b53aa697dd63741a0a8800dfb971249b1c61432abe45ce7420b03486b7a8450691ab8b06424c64e40483407eb36b96724066a93cf02199960045cda64d84fc77020bc0ca0e3dedb50800aebd3bd7d95012556837c58c34b34518f40eb63e25aa73fa69f0c3f3cf3a8feedf2dfcf0f37b723f38cfe936739eaebf9dff93097d1f32f5fd3a5bafdd629e05579a7c49bd36dbcd1e83cf388b97d4de80d0091c2761bf0127cba9a2076dcbd8f1356e61956e6a3dd8b512a4bd6e517e9d5ccaeb7ab2582f6a361ad4fc11214cdcdf4c192f45045640a485a1c8a0ca23434201efd9a406c12aaefeaef09683cf31881aa2c64833b1cc4a18e6f880d9e5b69943e3b587fa3af6d0bdc13ad34223d955f400a2e40717dc051d51320b130d5ada5ce74f30e22548f834eed4bee17d4c9eb5b7b27047ca782235b983824c9f80ccdf0c1ce75dc3307dfe343fb63861a8fa87fa91a5cbc7bb478912ae42443fc968adc03b3172bc865194fb30096eb52bbfc32f3d0faca7b9dd15628c2cc2ae90ccc36dffd5eb8b1f43d17d3401798f4c37d1548dd5bc0450860e3c8825bff1c329914e98cbda64eeb987658551c2f39dcb71de78f5cb9e03ccbcfef1785b49a18c825560fc4c6603401ec02e55c3d715bc3e661f8cbecf9bfe3b78083226a9a23d5c88d74e29a0113a834fc2622e07f88e884ca2dded4f30c0750fb0a38683e87b02500de90a9add5c903bf486410e6187e617ceb52df0041c95f18c0207ec875e2452b84daceb6f166e5ab59a088064a6726ae7b77a096346fe891b73fe229dddbb6abcfc167c9e931e8b9e71e5232e302eb486b283459402aaf3f2f8b38bdea9005e5a46df715e99abfe2cb9ca441f83d9d15b5892b5e64497626f51b9a33be3680836ceba37adfc2a7a4691af022c44385adf3f3c94c70f646b13354646369abccecc90e17dce5ec4fbf190256eaeff006b9fab21439bb445bc18cb69b70154099789ecef348ec7c08c3880663b779e7c75d1d23c8535ed77915edc1460d6a8c5bb855181bb0af6ae19dba6387e431f8719bfb21b4724e1720ee79740aed701aaafae62de141ada637d7d7b7b77b857dc98be7827e24ff0014da94605de6a2c7361ca26e498261ef19202ad4ee3ccd4775398bca4ec8ff4b737fb7fbd4cc266954c0fed79a5b761f4ee209e4330abb78081b2efaee2c7b679160b78579bbd7214e43b81ed791652c3e4c6351b8ce0d2a9a342625dbc777ceadd0940c6251f7b6a28023e7ddbae1b326b2150cf0541f19b1a787e99335ae3b5adfc933030cf0b5054413c036c12c544a4224b96ef41be944d7397579dc45871733e36d0efd75bbf3c9c1168a79430af76c587809577c58347a63593a912a4294db8fb2ff7083b0b7b4bbc5e5bc9076aac93d76c6198a8fd53904256d1421832363e9b97fba7d46e1fe599170a00ac46f860aa8add7948e023a57900e1e1d7d854f5d8c51c033aac3d940bdf2b236db02fa26d1d1a9ba89292ed88f680966297fac42956f121285c4fa1c15db62613437a992986b6da4ab33829fd3ca9652d71a591a6212babad078e6abc898c3f57f26e9d4d86b823a489e2996971f196ab434fe7ce22a3eb052562f1ee4dccd2e6d69f7812c02bcc92e651e07c47e121aca54ddf1f726ce3fc5b57168ffa38c6786e541fe2b65e60febfd607c482976ebcb9379cd5d67498421dee935309b6366f579e2c087bef72b02d1b942fc64eeb2b931ec77f2abb79dfcdba16606d41a63d1f70de68fe5b3b4095ebbb8751256b2e727de2d91ea3fb5476c9e372bf242f061424c6640a46faa8400dca06dcb2be46685fc3ca618c3283df690f94ae8fa9a16310d55c143dba80af7d0fd09014189bff0f0cb7cef4c3616418e46f440076447c73a0fca79911a8421b01bd09819799222b11d9d75db885fa619a07125783c9aaee200d1eda838845c506929fd97c40a49bb4a22cf1e4960554097e019710873d46fd35b2ef776258be1e95dbddc18a1dd21e365e829262def53f5921ff42169ac5eb224f1d24637d0e47c472c2ef408f7acc767e74d175e2fb57f43d98e932a1806cb862b74742e56050f10f8032204d60def32e9b6adcd92f5a120a746a1e97b46e96846cad14f94638b093c8245cea1c030f99cd668c94d627bff463ebafd294c978c95f628fa1e9613b0f847da079525b9654e1a2bae5dd1e32ad70e36ebc2ee74360d952b5ca859fa33ec134d3ee1c0c04541c78c6fbfb3a6d2c591c824893e67818669cc0b4f55a3a408618a97bbb0f38f84f6e7fc727b519c7092ede9282d59cb751a599a89fdb9be9f32e5b1da0c7e62921142fc5dad0e5bdc2462d6f4709d2bdc7997629f3ddfffe98faa881026f5327d317d4b1f9807b4b02f00404b6fba5ec38cd459a08f37c02872cb4bb2c6c0d4efbca2bf1e8cbd150b11ae1ae2dc8522ea1185b577c65c9e6d4442d82884f8f5b4dbc6da5d64f9ebee26609bfc5729e1ffb2d502db9aca1f32c20106b76d4e1036869096c10d633e85a4193b00afeba6ef9cc26639c9baa57631fa4e66e6a9fed62a17f7e353d6bf245f4d43ea65bd686c692d0d6790ce581989c768c84ad12ffd9b8206fe1e60de5e4fe5343cd840a608f5d0db1b7828b9397878e002a6c051c14bb138a9767195f708d2dce4120197ff3f8ae8c922d91cb8650963e554d3729e9d58503b8348a2a9295916bf3fcdb23e4a2c4add4aa61fad55d463c7cfed7c68028fe8f0d6222ff75dd761c22ff17ec387b5aefb3b689fde29c12301590d302a5bec8a7350f05d38550d6a2dc398ae7d18310f1f87b6aaacdf1be7d63d0f44412371daf61fa6661f75b82737fbe017ed3b0142bc36c2a7b7f6d84dbdefbd121b25d0c466d13cda03643bbd6579923fe27cce718b3d548f5d79ad10e7d807c2e3f6fae22ba90d9434095c0255327cc5735a587e0cf274ceb256641351d9a8a71f0a36bff308c165aecb6332bfb1a327fadeeb167a8917ad60940e96f47dc1dd8c61cf1e4d97676ee7e465923c9a236657ea45dfcecd3769edc11067f29d874fb21aedd8babc4db02aff40cc52599ad107b9fa00aa35c724b5e6584ad77f851f89baa9dbfe742d7ba1658a5d923f4173d6340dcf3e947a3a8181f58312b5bf8675bb74381a4cc7e922bc02e9505b14824a83e666782d0f8f901e06e7769c263acfc0048eac2dd382df0fb610586368dbbde8961108d60f9ff5b9fdd85e3d3e5d496a7620eab3fb72d6c84713bd784e809eff7f8143ae91555cdeafee74265e71fc953bdd0e38426f90fb849fed6d0af1e479ac62a878476ad876e184974e2831a14a24a5e2f6de52f522e2507a8bbb9859f41d025acd27f427afc22aaffdc1e9ae8b65ac23ddb7ad4179df0f36e024b17a4ed7f8d7f83cdd90e232dc88d69909807fe22933957c5bc92b150acdaff5e3a8df18457979045749e25819073389887c89b0f81f0b041574ab2a851328258e055a95c554272d66e42a558d04629112bf976cb745b03a7133645ed995145daeb5f0a44d5af369805e2c2ff83e23cdb31f92d411f9c0cfa8a8e934c627445e6474ec1ae1d9523d80e8b3737dd045dfc0de4dc186e72af606fdcd2bcff84fbc01d50f09716c4343c9ac97eb487ccaa868dc7b79e2d2340bc9ba5a48ddb20cc4cb9a2da44b64b4e2ef3ebce36adcecb14c256644a2825eee56e090ae19807756156cb29cd0dca5ae9659cd60a040279dd6be3ab883e387973b68536d37a4423da4566d0ce0d9785d0516fe8ac6e74eb318a8652103a1e58c70e6fcf4980f05ac0c53d8edef1ba8642ea22d3e76d4765704fddf9f1b4e3aeea322bd2517caba5b746757a02b7126b864b973421f02d505a1ffc478e35cbb96155b59cc821727c8e90cf5673b747d1a184253cc51672c541fc", [[], [], []]}, 0x13b0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) pipe2(&(0x7f00000000c0), 0x80800) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:37 executing program 0: 20:49:37 executing program 3: 20:49:37 executing program 2: 20:49:37 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r4 = semget(0x3, 0x7, 0x91) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f00000000c0)=""/7) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:37 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r5) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000800)=0x6) 20:49:37 executing program 0: 20:49:37 executing program 3: 20:49:37 executing program 2: 20:49:37 executing program 3: 20:49:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89a0, &(0x7f0000000000)={r0}) 20:49:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x91, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff0100000011"]}, 0x109) [ 1276.090711] kernel msg: ebtables bug: please report to author: entries_size too small 20:49:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x3b9, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:38 executing program 3: semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000040)=""/71) 20:49:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) 20:49:38 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) listen(r0, 0x8000) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="c1cf02b61558798e3404e85b7c621bd593723be243c7675bf713b93914ce2fcc2e1f21fe1c39be7c141bf79e847949baeac40694837b1fee4cd4bce35b86f24bb775d7881fed400de68fc46bec4af7fe2d37784c818755e90e12e188eb83cd63dbbfc2274ecf40a1841e15df2c42a49924a0b292bd7fe00ab9e6833e230978254d7d97be95064f7c8818bd637475d46788ed0e5fa0b6951948db902900ea1091ae1f9d8663f1652e4d7c5058ca40a0fcd03c3f928c3f9ee8882790f27968fe0d7cd40eb999937079e365568a0315958ef2e9ad0e0d8e333675e9a015d000cfee1d942d7fdfffd66d7b80fa5cb61715f1e01a2995bc65"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xfffffffffffffe30) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:38 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) fremovexattr(r1, &(0x7f0000000180)=@known='trusted.overlay.redirect\x00') 20:49:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x400b, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x18, 0x1000000], [], @remote}}]}]}, 0x2c}}, 0x0) 20:49:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000001100)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000f40)=""/191, 0xbf}], 0x2, &(0x7f0000000d00)=""/210, 0xd2}}], 0x1, 0x0, &(0x7f0000004840)) 20:49:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x9}, 0x20) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 20:49:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) 20:49:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) 20:49:39 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 20:49:39 executing program 2: modify_ldt$read_default(0x2, &(0x7f0000000140)=""/214, 0xd6) 20:49:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) shutdown(r1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:49:40 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000300), &(0x7f0000000240)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000000c0)) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r5) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:41 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="d61a352b065e298ebf7bce552d3668c225196822727b48aa295a7bf6f61446c85c0e4ebb2df9a7c852c8768f3c84cbc70a68075a2a6c920756262ad819e0696bce6426e886e98eca13cae613bf2c099ae79543fcad881b50d39d96de8b0f794b840209e303e4e975e42e603fe22be5e57edddbeb01c0b16bae4066b54e52e560dc6f75a386a3030f595e201f33c4ca40fd3595b7684805536c244cdd09076ccdbb19ec5817fa19769b02c7c07433"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000006, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:42 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) pread64(r2, &(0x7f0000000380)=""/183, 0xb7, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f00000004c0)="94") 20:49:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000000)=""/146) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0), 0x0) 20:49:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) shutdown(r1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:49:42 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() fstat(r0, &(0x7f0000000300)) getgroups(0x4000016d, &(0x7f00000007c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000240)={r7}) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) readahead(r0, 0xfffffffffffffff9, 0x5) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000780)={[{@utf8no='utf8=0'}]}) 20:49:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)={[{@dmode={'dmode'}}]}) 20:49:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) 20:49:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{&(0x7f0000002d00)=@ax25, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002d80)=""/133, 0x85}, {&(0x7f0000002e40)=""/124, 0x7c}, {&(0x7f0000002ec0)=""/225, 0xe1}], 0x3}}], 0x1, 0x0, &(0x7f00000031c0)={0x77359400}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) 20:49:43 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 20:49:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) [ 1282.199063] FAT-fs (loop2): bogus number of reserved sectors [ 1282.219834] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1282.247845] ISOFS: Unable to identify CD-ROM format. 20:49:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000001c0)=0xc) fcntl$setown(r0, 0x8, r2) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000340)='./file0\x00', 0x0, 0x2}, 0xfffffffffffffcb2) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) ioperm(0x0, 0xf39, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:44 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) 20:49:45 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket(0x0, 0x0, 0xffffffffffffffff) r0 = gettid() openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) tkill(r0, 0x40000003a) wait4(r0, &(0x7f0000000040), 0x0, &(0x7f00000002c0)) 20:49:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={"6c6f000100000005000000001d00", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) 20:49:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r3, 0x4, 0x72109c5fef5d34d3) r4 = gettid() fcntl$setown(r2, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00000002c0)='./control\x00', 0xa4000960) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './control/file0\x00'}, 0x6e) 20:49:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80)={'syz'}, r1) 20:49:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcd, &(0x7f0000000000), 0x3c) 20:49:45 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000405000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1ffffff, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) 20:49:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xe9) write$uinput_user_dev(r1, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1283.828045] input: syz1 as /devices/virtual/input/input40 20:49:45 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) 20:49:46 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000240)='^posix_acl_access$vboxnet1#\x00', 0x1c, 0x3) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000000780)=0xc) write$UHID_CREATE(r0, &(0x7f0000000940)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000300)=""/70, 0x46, 0x2, 0x6, 0x90, 0x1ff, 0x1000}, 0x120) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0xa0100, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000240)={0x3, 0x5}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x10000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:46 executing program 2: 20:49:46 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x12, r3, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ead000/0x4000)=nil, 0x4000}, 0x2}) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:46 executing program 0: 20:49:46 executing program 3: 20:49:46 executing program 0: 20:49:46 executing program 2: 20:49:46 executing program 3: 20:49:46 executing program 2: 20:49:46 executing program 0: 20:49:47 executing program 3: 20:49:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f00000000c0)=0x68) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="2d32fa0601f20bc5f2f3d62aeeb5474cf04b2be85190aa53a58d2dff8abad1cd76569de6ec9103cc6e2a33e54d9aad911a54543560a4e0c6151e7638a6290f884eaafbe329019729ed64cbbaca4f5c64904f508431479128d7533fe089bbd1e4dc884dd70c053f641738fbbc9d49df51ca6b336db1fd1b38ac4b6e3d0e8d1d8c0401f545fd2fd871d05bcc8859e4c84fec248852fcf5ba5f1c9bf5e51f0f5abc5648716b9a6b176afc11e268762619343bcbd6fccbdfb135affc9c7210a5398330475dd552135402d22a3aa0d13b1b8a45e86d66cda88ee77c8db03f255ae5d3395baf543443ab323fd282ebaf9db05abd3c3859c1b14a2a"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:48 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) pwritev(r2, &(0x7f00000003c0)=[{&(0x7f0000000a80)="d4a4bc8c1b5046785f7d16fc601ddd3459e632e474b28d50481954889d55b332e75f5a8d5e35e987b4b12aedf007f3575fc24295cf4c6553fcfe19bf518d4fd4fac8f43052a18a1be25006267bf6b491110aca21ea4dbce9a424ce994f1d7f999d4e6f422ee752a9687436858611b620c7695c62d4aa596480b817b57ef544fa3c77a36864f48492682f473ac071bc403fe6e5f2ce889a31761d65f98618d1006bb501418b8fe03ce0cf5f7b8040a3a274c36e37bc45551d31053097581bc69f63e6cfef", 0xc4}, {&(0x7f00000000c0)="164295d5187cf6", 0x7}, {&(0x7f0000000300)="c2b769e36031ebc474242e313355a9889cfa58d3656f1d517f3387427fc4cd33b5079e9dbc91a130d7b2e99eb21e7625fc668c8e2d49df4a2515fd3576639b990ddca6999ba4", 0x46}, {&(0x7f0000000240)="6d000537fdfef076f100772e6070d9ae52a14b5aef7fd24934bd94995b28", 0x1e}, {&(0x7f0000000740)="d79c1e636079f8f820e0bd993ce45f2dfdcc56fd0de12248e2579c3aa8d908bd2c6e9bd67ef6c00a5549d43ee649994ecfbcd30222b09a8bd34d62fadbd6db226e4496b0f96ea55873c6dbd28a2b1cb7b6023e8eb3ce962ba27f9e2731dd6bc91cb2b85fb1a62d495e93c13874286fbcfa430de48bf2a1c2d5ec1baf7c98518d94559eeb65a31218318107c3", 0x8c}], 0x5, 0x0) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000980)={@multicast1, @remote}, &(0x7f0000000940)=0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:48 executing program 0: 20:49:48 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) socketpair(0x3, 0x807, 0x3, &(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000140)={0x80000000}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:48 executing program 2: 20:49:48 executing program 3: 20:49:48 executing program 0: 20:49:48 executing program 3: 20:49:48 executing program 2: 20:49:48 executing program 0: 20:49:48 executing program 3: 20:49:48 executing program 2: 20:49:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r5) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000800)) 20:49:49 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) write$UHID_CREATE(r0, &(0x7f0000000a80)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/38, 0x26, 0x3, 0x7, 0x1f, 0x81, 0xfffffffffffffffc}, 0x120) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000740)={{0x4, 0x0, 0x1, 0x100, 0x3ff, 0x5}, 0x0, 0x3ff, 0xfffffffffffffffb, 0x1, 0x4, "c9dadfd055c5443417ccb238ce1ad1b29dae63339d159a26f0041e4a4bd0306528a47e07d62487009d22ec256f05ea810a27ea0937eaaf8c00c8127537ee10bcb03b27bf2c2fcf8845dc09445112887cc2c67e440aba0a81e4914412674a70bb714e34ab4fabdd99f6080c17c2a681d961e4f1bd3ec417f0ced614a50bbfb2cf"}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x9) 20:49:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000900)="65781f3c00", &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000004c0)=ANY=[]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 20:49:49 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f00000003c0)) ioctl$UI_DEV_CREATE(r0, 0x5501) close(r0) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) futex(&(0x7f0000000140)=0x2, 0x5, 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000240)=0x1, 0x1) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) socket(0x11, 0xe, 0x1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) write$P9_RREAD(r0, &(0x7f0000000380)={0xc, 0x75, 0x1, {0x1, "13"}}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000003c0)={0x1f, 0x1, 0x5}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) 20:49:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1287.929573] EXT4-fs (sda1): re-mounted. Opts: 20:49:49 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f00006dc000)}, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000b21000/0x2000)=nil, 0x2000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) [ 1288.241837] EXT4-fs (sda1): re-mounted. Opts: 20:49:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x80000000) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:49:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x2800) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000840)=0x80000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz'}, &(0x7f0000000740)='}]system\x00', 0xfffffffffffffffe) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000d40)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) sendmmsg(r1, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 20:49:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/233, 0x1fd4ab97eab982ae) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) read(r0, &(0x7f0000000280)=""/151, 0x97) 20:49:50 executing program 3: 20:49:50 executing program 3: 20:49:51 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="28b4f55b50c08d14815f196c060c7b6d06"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xfcae) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x745e}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={r6, 0x80000000, 0x30}, 0xc) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:51 executing program 0: 20:49:51 executing program 3: 20:49:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:52 executing program 2: 20:49:52 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000003c0)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @dev}}, 0x5c) 20:49:52 executing program 1: 20:49:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000740)={'tunl0\x00'}) 20:49:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x34}], 0x100000000000037b, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000100)='ppp0\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r3 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x14110, r2, 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f00000001c0)={r3}) gettid() waitid(0x1, 0x0, &(0x7f0000000400), 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000140)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) fallocate(r1, 0x11, 0x0, 0xe4) 20:49:52 executing program 2: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:49:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 20:49:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x0, &(0x7f0000000240)='vfat\x00') [ 1290.917042] FAT-fs (loop3): bogus number of reserved sectors [ 1290.936573] FAT-fs (loop3): Can't find a valid FAT filesystem 20:49:53 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000004680)=""/4096, 0xffffffffffffff58) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@newneigh={0x30, 0x1c, 0x331, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@NDA_DST_IPV6={0x14, 0x1, @mcast2}]}, 0x30}}, 0x0) 20:49:53 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000080)=0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x200000f, 0x11, r3, 0x0) truncate(&(0x7f0000000140)='./bus\x00', 0xda) recvmmsg(0xffffffffffffffff, &(0x7f0000004300)=[{{&(0x7f0000001700)=@alg, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001980)=""/184, 0xb8}], 0x1, &(0x7f0000001e40)=""/120, 0x78}}], 0x1, 0x0, &(0x7f0000004400)) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 20:49:53 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@rand_addr=0x1, @in=@multicast1, 0x4e21, 0x4def, 0x4e22, 0x3, 0xa, 0x80, 0x80, 0x16, r2, r1}, {0x6, 0x8000, 0x7fff, 0xa, 0x7, 0x8a2a, 0x5, 0x4}, {0x2, 0x6, 0x90, 0xbad}, 0xfffffffffffffffb, 0x6e6bb2, 0x1, 0x1, 0x3, 0x1}, {{@in=@loopback, 0x4d4, 0x7e}, 0x2, @in=@loopback, 0x3501, 0x1, 0x1, 0x7fff, 0x80000000, 0x6, 0xfffffffffffffffb}}, 0xe8) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x5) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:53 executing program 2: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:49:53 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:49:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="f20f5824900f4b360f31660f01dec4c2d5400e8fe950903558000000b9cd0800000f32b9800000c00f3235000100000f30c4e195ed2367660f38827b36", 0x3d}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x10000000000062) read(r0, &(0x7f0000000080)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 20:49:53 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x101000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r1, &(0x7f0000000100)=""/182, 0xfffffe49) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000f80)={0x10, 0x0, 0x1}, 0x10) 20:49:53 executing program 3: clone(0x200, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000580), &(0x7f0000000800)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540), &(0x7f0000000040)) read(0xffffffffffffffff, &(0x7f0000000300)=""/11, 0xb) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f0000000380), &(0x7f0000000740)) 20:49:54 executing program 1: 20:49:54 executing program 1: 20:49:54 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7943387af36c8047a94ad23c44ae7bde6c3b05ad9a86ee0d87f29948ebbc87836fbf57129cc6982ecc00cc1e413f192c888676d8ac9a9b1e55b8a6d5b236fc30c2dc75efc5abbad20437ffa3b5d10c33ed62b519b6f54ae8fa2bd6f2f4d689a7cdbe09536bc879879cc8b4d816af0130149fdad72d76"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:54 executing program 1: 20:49:54 executing program 1: 20:49:54 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x814, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:54 executing program 2: 20:49:55 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:49:55 executing program 1: 20:49:55 executing program 3: 20:49:55 executing program 2: 20:49:55 executing program 2: 20:49:55 executing program 1: 20:49:55 executing program 3: 20:49:55 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000300)={{0x1b, 0x7}, {0xe2, 0x1}, 0x9, 0x2, 0xfffffffeffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x6, 0x5, 0xc32, 0x1b, r0, 0x3}, 0x2c) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) fcntl$notify(r3, 0x402, 0x8000001f) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:55 executing program 2: 20:49:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/ip_tables_targets\x00') setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000700)={{0x11, @multicast2, 0x0, 0x2, 'fo\x00', 0x5, 0x0, 0x73}, {@empty, 0x0, 0x0, 0x0, 0x9, 0x4}}, 0x44) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x4) creat(&(0x7f0000000400)='./file0\x00', 0x200000204c) close(r3) 20:49:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000200)=[0x8]) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000003c0)=""/56) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)) mmap(&(0x7f00006ec000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 20:49:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x1d}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 20:49:56 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000006c0)='net/ip_tables_targets\x00') r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x4) close(r3) 20:49:56 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f00000000c0)={0x7, 0x9}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:56 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:49:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) [ 1294.503907] audit: type=1326 audit(1541796596.285:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=5816 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 20:49:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000016000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, &(0x7f0000000180)="66b9800000c00f326635001000000f3066f2260f019c001866b8000000000f23d80f21f86635400000d00f23f8360f23162ef30fbdc8d1110f00180f01cf66b9800000c00f326635000400000f300f23ad", 0x51}], 0x1, 0x0, &(0x7f0000000600), 0x0) 20:49:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write(r1, &(0x7f0000000280)="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", 0x1000) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r1, 0x3, 0x7fff, 0x8000) fsync(r2) 20:49:57 executing program 1: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) close(r0) [ 1295.294867] audit: type=1326 audit(1541796597.075:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=5816 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 20:49:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote}, &(0x7f0000002100)=0xffffffffffffffc2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000001c0)={0x7}, 0xff9d) r2 = open(&(0x7f0000000140)='./bus\x00', 0x149042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0xdd}, 0xba) syncfs(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x9}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x0, 0x4}) 20:49:57 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) memfd_create(&(0x7f00000000c0)='lo]eth1%/\x00', 0x0) faccessat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) [ 1295.652361] audit: type=1326 audit(1541796597.435:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=5866 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 1296.439258] audit: type=1326 audit(1541796598.215:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=5866 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 20:49:58 executing program 3: 20:49:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0xf, 0x5}, {0xff, 0x8}, 0xe817, 0x1, 0x6}) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 20:49:58 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) 20:49:58 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x1000) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000001f40)={0x0, r0}) recvmmsg(r2, &(0x7f0000001c00)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/97, 0x61}}], 0x1, 0x0, &(0x7f0000001c80)={0x77359400}) dup2(r1, r2) r3 = gettid() tkill(r3, 0x16) 20:49:58 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000001c0)={0x3, 0x7, 0x2}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:49:58 executing program 3: 20:49:58 executing program 1: 20:49:59 executing program 3: 20:49:59 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) 20:49:59 executing program 1: 20:49:59 executing program 3: 20:49:59 executing program 3: 20:49:59 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) socket$nl_netfilter(0x10, 0x3, 0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000140)="d8ae59736b3766941dc32c34f43a01f630d756c67ef8d028190458ea2c072da988830c074db3e097b1ea71015b03d3f97e1861a57c14b3e6f3dfd7211897d381d5ea286c24538c903a", 0x49) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:49:59 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) 20:49:59 executing program 1: 20:50:01 executing program 2: 20:50:01 executing program 1: 20:50:01 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:01 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x16000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000b00)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000c80)=""/140, 0x8c}, {&(0x7f0000000d40)=""/149, 0x95}, {&(0x7f0000000e00)=""/242, 0xf2}, {&(0x7f0000000f00)=""/17, 0x11}, {&(0x7f0000000f40)=""/142, 0x8e}], 0x5, &(0x7f0000001080)=""/179, 0xb3, 0x4}, 0x10000) getpeername$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001340)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000016c0)={@mcast2, 0x0}, &(0x7f0000001700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001780)={0x0, @rand_addr, @remote}, &(0x7f00000017c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001800)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001a40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001c40)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a00)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002bc0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002cc0)=0x14, 0x800) getpeername$packet(0xffffffffffffffff, &(0x7f0000002d00)={0x11, 0x0, 0x0}, &(0x7f0000002d40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002dc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002ec0)={'veth0_to_bridge\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000003600)={&(0x7f0000000300), 0xc, &(0x7f00000035c0)={&(0x7f0000002f00)=ANY=[@ANYBLOB="8c060000", @ANYRES16=r1, @ANYBLOB="00002bbd7000fcdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="3c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400c60000000800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400800f000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="3c0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="140202003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000500000038000100240001006163746976652000727400000000000000000000000000000008002300000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400f3ffffff38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004009b0a00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000008000100", @ANYRES32=r14, @ANYBLOB="880002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000300000008000100", @ANYRES32=r15, @ANYBLOB="040102003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004007f0005020300000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r16, @ANYBLOB="4c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400f100ff010e0000000400ff0600020000040003090000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000101000008000100", @ANYRES32=r17, @ANYBLOB="e80002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400070000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="400002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22], 0x68c}, 0x1, 0x0, 0x0, 0x44090}, 0x20000040) r23 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r23, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="bfed58573bd2d4063f03d6a080b1be689c5f528cc79a846c2b7234ca46e9dda9a0e943f33c049411e1b0223ee4578f17902d8b1752d1730bbbe4f30bfd4c6f"]) r25 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r26 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r25, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r28 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r28, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r23, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r27, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r23, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x323) ioctl$ifreq_SIOCGIFINDEX_team(r23, 0x8933, &(0x7f0000000140)={'team0\x00', r29}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) dup(r26) getsockopt$inet_IP_XFRM_POLICY(r23, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r23, 0x5410, &(0x7f00000008c0)=r30) ioctl$KDSKBMETA(r24, 0x4b63, &(0x7f0000000800)) 20:50:01 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) splice(r0, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x5) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="563883d63fa0a6e9cae554c056285b93cdc074ee0ed49af1d745354d24144c4e8ce0b5bf18072e67b66e444dfb33689783914d418751c9ad602b96d4724f1bf025204fd623e32fec21c6641981b4bec7bec81999f239d40f8ac844b289481ec878b62a5ef1af58eaf4994f2a02d72f33c1f69fe0a757c29f9742db6fd5755399c5828544ebef1ecd4ee2d9bf6cc66d5115272a76301a0051479863552f7fe0f89fd478998941a7ab6cb8bb4e4d74bdf09cc0d26126a334625ebd03040d1b1ce509fa57d7ad2bd089f7c8ab18882d91392d8b19b235443b00074574fd0ea2cc61d85e2e1171b6c431652e18f6b97d557c6490d4d5d9a26e41d75e5f54df3429cbaba0c874e5e93bf0ffcc93a135a3969639fca1b330552013f283a6e52d309cea6b5a5bbb3ee809685c5cc9987e3dd1b75eda4ed4"]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0xfffffffffffffffc, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) 20:50:01 executing program 3: 20:50:01 executing program 1: 20:50:01 executing program 3: socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000300)='0\x00') 20:50:01 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) setxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:device_t:s0\x00', 0x1e, 0x0) 20:50:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"000000000000000000e9dc00", 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') close(0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f00000006c0)) 20:50:02 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='ip6tnl0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x23) wait4(0x0, 0x0, 0x0, &(0x7f0000000280)) 20:50:02 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:02 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{}, {0xa, 0x0, 0x800000200000, @loopback}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbf5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000040), 0x0) 20:50:02 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x40000080800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:02 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x384, 0x0, &(0x7f0000000180)}) 20:50:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x1, 0x0) 20:50:02 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) close(r0) 20:50:02 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 1300.596836] binder_alloc: 5974: binder_alloc_buf, no vma [ 1300.641267] binder: 5974:5977 transaction failed 29189/-3, size 0-0 line 2973 20:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, r3, 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x8002}) [ 1300.690273] binder: BINDER_SET_CONTEXT_MGR already set 20:50:02 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) munlockall() [ 1300.738175] binder: 5974:5988 ioctl 40046207 0 returned -16 20:50:02 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:02 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) write$P9_RAUTH(r0, &(0x7f00000000c0)={0x14, 0x67, 0x4, {0x4, 0x4, 0x5}}, 0xffffff98) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0xfffffffffffffe63) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) write$P9_RSTATFS(r0, &(0x7f0000000300)={0x43, 0x9, 0x2, {0xff, 0xffffffffffff417c, 0x4, 0x3fc000000, 0x5, 0x1, 0x1, 0x1, 0x8f}}, 0x43) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) bind(r0, &(0x7f0000000740)=@pptp={0x18, 0x2, {0x1, @remote}}, 0x80) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)=0x2) 20:50:02 executing program 2: syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x2, 0x0) 20:50:02 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:03 executing program 5: 20:50:03 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, r3, 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x8002}) 20:50:03 executing program 2: 20:50:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:03 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000300)={[], 0x2, 0x100000000, 0x7f, 0x83, 0x400, r6}) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:03 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:03 executing program 5: 20:50:03 executing program 2: 20:50:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:03 executing program 2: 20:50:03 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:03 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000300)='team0\x00', 0xfffffffffffffffc) keyctl$update(0x2, r1, &(0x7f0000000a40)="8ad767c04f5871f6cf60638b6183fbb643e5fb0daf79a89a1cee77806f00d9ff4e6a6c4366f0c3252b64072c9bc8c540dfb63a44d033da46f49c2c4624c6231314988ce8246054041dda4e7444d5e15f54a9d9d877929b54e805bfe40c2b1874778e1a21a511434ed9302f99a3a3eda1066cd4d6706f97af619ab31f6e74a15eb92034179f02b9fa8003d09bcff705138184c491346235ef384061c43c8ddce9f18de075f8b32b11805783225f127060322e28695f98e5c293b4917dbf25dc", 0xbf) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="dda01c5c2c8027d8fe32f4f263e6736a857fb7758247d40b330f1904bfa7b06f1e0f68ad329dc29a50f087e3be3ea68f076d4e3bef86f0450a44d9c679ee905395ead206800f8cc0"]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000800)) 20:50:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, r3, 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x8002}) 20:50:03 executing program 5: 20:50:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:03 executing program 2: 20:50:03 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:03 executing program 5: 20:50:03 executing program 2: 20:50:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:03 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:03 executing program 5: 20:50:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000080000002) 20:50:04 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r3, 0x2, 0x1) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0x485) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000001c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000740)=0x5) lookup_dcookie(0xf800000000000000, &(0x7f0000000780)=""/69, 0xffffffffffffffed) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e23, @broadcast}, {0x306, @local}, 0x2, {0x2, 0x4e22, @loopback}, 'ifb0\x00'}) 20:50:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, r3, 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x8002}) 20:50:04 executing program 2: 20:50:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000080000002) 20:50:04 executing program 5: 20:50:04 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x6698, 0x0, 0x4000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 20:50:04 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscon']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) clone(0x80002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) connect$inet6(r0, &(0x7f0000000100), 0x1c) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 20:50:04 executing program 1: r0 = socket(0x0, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:04 executing program 2: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) 20:50:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) clone(0x80002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) connect$inet6(r0, &(0x7f0000000100), 0x1c) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 20:50:04 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscon']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:04 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) accept$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@ipv4={[], [], @broadcast}, 0x21, r1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r4 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r6, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r5, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) write$binfmt_script(r4, &(0x7f0000000740)={'#! ', './file0', [{0x20, 'bdevvboxnet1'}, {0x20, "2e657468319876626f786e657430297d26656d31747275737465642c"}, {0x20, ')cgroupself+'}], 0xa, "03647040a581f3c6babd4b29be3f0e20e8aaf726889462a62bc158b69e85cefc23649e5c627537acdff421f8b0253a30fd5be17bb6ca16fbe8a4d080b287e6ad36e662d646f134bf53a28ca6c1b6f392f14490ff3051762114a101886b66e20523589579e4afd83dc7ce"}, 0xac) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000000c0)=0x36) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r8) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000800)) 20:50:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, r3, 0x0) 20:50:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/112) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x8001004000000016) 20:50:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000003000000"], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) 20:50:04 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscon']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:04 executing program 1: r0 = socket(0x10, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 20:50:04 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontex']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:04 executing program 1: socket(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000080000002) 20:50:04 executing program 5: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @broadcast}, &(0x7f0000000100)=0xc) 20:50:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000080000002) 20:50:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8937, &(0x7f0000000040)={'bond0\x00', r1}) 20:50:05 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) 20:50:05 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) write$sndseq(r0, &(0x7f0000000300)=[{0x9, 0xd6, 0x7, 0x4, @tick=0x1, {0xffffffffffff0001, 0xc1}, {0x45, 0x100000001}, @raw8={"d16e027e90a7fe38f96d7d07"}}, {0x912b, 0x0, 0x7fff, 0x1, @tick=0x4, {0x2, 0x1}, {0x14000000, 0x2}, @connect={{0x5, 0x1}, {0x7, 0xf3}}}], 0x60) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() ptrace$peekuser(0x3, 0x0, 0x0) 20:50:07 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) 20:50:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000002ac0)=0x1000, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 20:50:07 executing program 2: unshare(0x24020400) mknod(&(0x7f0000000280)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500), &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 20:50:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() 20:50:07 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0x73, "afedae198a653052060c18a7e4fe2386899f15824703ad8fddb31e9fde2d3638b1a7ca9a067b66f181f3fbcedaabb72be8e4ab94e4da074ea729294e1eaca9cf7af01140e8e8ff8ef16fa03c504c2874c39cb836e18f62d651fc841d89e218bf273e3bab49b6cc62dc80409eaedf087eb13f20"}, &(0x7f00000000c0)=0x7b) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000740)={r6, @in6={{0xa, 0x4e22, 0x7f, @mcast1, 0xff}}, 0x1000, 0x100}, 0x90) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:07 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscont']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) 20:50:07 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) 20:50:07 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscont']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp\x00') sendfile(r0, r1, &(0x7f0000000080), 0x8001) 20:50:07 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscont']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 20:50:07 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) 20:50:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) 20:50:08 executing program 2: [ 1306.206233] binder: 6249:6251 Acquire 1 refcount change on invalid ref 0 ret -22 [ 1306.267874] binder: 6249:6256 Acquire 1 refcount change on invalid ref 0 ret -22 20:50:08 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:08 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fsconte']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:08 executing program 5: 20:50:08 executing program 2: 20:50:08 executing program 1: 20:50:08 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fsconte']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:08 executing program 2: 20:50:08 executing program 5: 20:50:08 executing program 1: 20:50:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) mremap(&(0x7f000060a000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00005b5000/0x1000)=nil) 20:50:08 executing program 2: 20:50:08 executing program 0: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fsconte']) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 20:50:08 executing program 1: 20:50:08 executing program 5: 20:50:08 executing program 2: 20:50:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:08 executing program 0: 20:50:08 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r7}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x1, 0x5, &(0x7f0000000940)=[{&(0x7f0000004680)="c66e3ab21cac2428c1e2e45e08f5bf33ebfa275b81664dd1cdd710d2fac5285fe5e61a53a7033ce155c166edd3f5052e4d312d97b53e1235a24420119378e7d3285d23d3d7542ba4792f854dd42287bea08d913509e960e506b607574f1c8474d493701f7bc9b0d71c10288f08f3095f61b0e0ce10c061c95a6c22a1d6e304704a42bb14f0cd197c5e5dea95311fe59c5bcc2374eb1e9144d67b66f170ba982db0055a252c77f146c5a43f1f81006c02551f490eb02bdc0442e0270fcbf980600e262c5c3c01bf68b36dcff0c8a4a3ee0b2f74cc6b107b35bc3f5c1490585cc157ac74489530add75304cc21b7553c1703dbe1083041f08a376c894393e10fceae673c4f13bc106a5917143d6989e2b14e44fee1b154a692a6c9754f8357ca06384dd2a1fd1443e84f826e2c2680c3ece15b87d5000128e2f0f373c04d22ee869f94baf5b290369fca23c64ec095242c541c4221a91d4cc4684e12bc9011f70c7bf8aa87423534442f1ef48156f1c25c6f408f7c35d4891097de21c4df98bb6c8fd6028084e3ed6e3d8d0c7891f9e6276321bd2ec4de7c3207c48e3c9b3e388c8159efa9fe8a33148cd929f6cf23d9370cdd3b92d6d3418b4d410b31a074fc3add00d774f694d771e81ce875b6f523ce7ebbd0fcd62d12ff519b6c5ee23745e03e5857e99008c8b2164ca132658cdc794b39c43370d36b58200ad02efe3896dac5e2e45fb970612f4acab6b7cf22ba4b447000d25d8ec762ff5c16e1eed12ad294abcde317f5fbbef52f7ee9b5a56d6937b86dae88f7f7c2f5486d629993d044e5f7ffc13cf3903f9abbfda9bf1cc9625a71623ddb30f59e58030fd16003e1ea9a8ecf5ecece450da74cac1bb24f44e307a2532bee9006011c40f0ef477f50a7438993368072b5ded1fdcbf4bae5c6099dbc6db8bf97198fb25e9e9ff078cc0f8586f59583f082f5618d11635f22fcd81a138ef9925e7039cb933079125398aecb7cfdb75b87ab5e9c75d01424aad35debbecfe835585e32de0bbebe59bb656e1039cfc0c9efaa715d3b309e7dc7d4a0ac62cd4307214c9f2e7d3e12edfeba8c7fa55ef1aa611931fd5f29512f6a3aebfa0ef0958b9674a30f72da81b15083c97271cc3dd31cf77bd0ce4cde8592bf3601087839f3932ab8fe51440e411267c415ab0103df35cf4ac6c26924b8d5aad420c6ff30022d7dc8ab23ff918acfea78ca96c175faec9b4fb66d40795b42b42f2f996f80b37460ebd61c9c30727d557c30d9435040327955848b6c166f0b6b3203ca5f9338a854a6d245be1916a86c669d58b22049f537e3b278ad5e3515a5202cc7a89eb2cfb5eb447449a274572f77d0c49ad02ec7a29f58bf15876ad4b007ee5af8338ce597433cbd3ab0ace0166233ee3e54cc22c69cbfea834fb73fe3c88fce68949e4522b135eb78ccdcb65455f99c0ccbcd3a35d97857730d36c636c66abb3835c5eced66720891cac52ba518ecd183e72a63075dc0f7e79177d51e0284426da36ae61c48163d2d2e16cb72fe8f59f10841bc4541049f84aa9b1e8cb2fddade71d64a8def5597f0675c4fb070b60526b9a0635dc89361dbcfb4451a2ee9cb691f04c14f9aabcc4e2f4a851548dbfd7c8675af32551b550652d5dfe68c359e88cb4837f46f9ef1ee06aa404f5029028b9c87c9e8ee62d0ee7e35e00bc6d800958d513f948fe7c24a0d6216003faefb25766df7dd5c38f08ffcf1b83a371a23f0896134c9bfe048ae5c06bb7cf391819179a541c4684108b2f49573eab41fa1a6feebe5b279fa5e8a74c8844f684f8463eb84213b833e474ed8efd98e6e6888959f293d74006ca9d08661ce740143687294bc704a89dc431db574998991d6bbb9b93f8896e6687eb6404ddc432f3c5402379215577a8447dbabf6ea6b1f615c9cf92a8e5b74bf42b272a856ab0b575ccb89d3f07c8a4f7ee820d2973aaa7ea79ab14f15076c3a6de38d1f380f8c9fb5083c3bfb3c1f69f7aad4c20abc175153367019a06730a75f6448643da4fc3836a167011782ba310716a6dc5414701729338dca049294126162794d1f59d65d9a758f7aec8e4afc283ba550164630d81e7bd9ebcde2b478d421027946356b105d7330bbda8a4d4a4d5f1e6772ed80bdf115ca22f9e896aeff21c99d01da870cd1c1f0f322c965f2a8bdbf8a6da47b2ff72316bb390c7ff888e9c3301f515e320359c366ccddcdc082313b5b11d6625c3b9bfe7953b4874717f3c9958bfbbd7f150f85db062456d0eccd6d8030a5d3fda4e8a17db5c78d66fc14b8614a4065bb6d286a346067d4cb3350e838de1d16c690929176c057ef93e049ae4b77b0277b028ec4155772c76321fe5a633d3a93cf0d5873235844535c9726c19f34084c70435c772d5fe16cd02b09ff66f1efa2d617a878b28f07d751216f73f58cc4cb763de2d3f127cc25f5ee3016bf674e42a1c7b97a51c98639164b58852b665f222d55a4f1881e23fd0a7f26f7e260d36a099929bb68af49283f39530a5eb7c21682498d9c930ae84a679c7d57aaa9c8b287a25f122f87b2b0273cb61fd68bad5376556e910d999544708785db7b6b566b81238dbaf8308cbd156fde37f6d70468e4edb540403ebcf58ff90b893d7f3f1b5e2613fb6b8e7f1fb45b6196f2cf99f55861906cc2b93906d5b5d50391efb8a9ed510c51a8a961d47e9cb9b1b7addf607e39244e02c1493432b096bd47d50986e235bbce4dab3edb4619624c37a66c76e8d245eb887ad3c89b38421cac0a536aa80d3c860589d3a0ae839db15511fd47fea2a07b682e1a57563a41420a3036437310ef32e8f9930692d97b4f4fcef4eef8aa04f5758ee9f030c11f1a8fe87db17664c6be91f04fca5d6ec78b34865c0ba1ab002bd3ea6a7a3055e02f5e7328da40b5d757a1259efaacc916cb77047f264cfd32dafebdd2afd962e207361cbb8671f22f595ef04e0e19918afe22b1d667c9f5534895827ed60b758d46a9e458c259fab7d73a29d56af4b1c3a98b17074ced2016071e34f371c7711aeb03974bc9ec7b784ca6cf38318ebf780523e24eebad4615731e86762156afd814c28d103c9c19389da1b648904b267a2c494392889cf2ba97d471020fc81387e37cdc7a6a1bd073c2a0500739c5aff0a466ec6f0ed7d17871e76d5e9fd3ff6bd6907327c3d79033163bc01ead389fe98dbabb57b24602d5058a5bc0f7289133de8d8a62c3fc501d274db9e245875682be4e9834eef4d2dbf31e735c20f6666d2d7d242832234923b2badbc2bc9ca0c8d6bb233f9e172289c87e6e4b94e8dce0d533c64721ed057784a385f6e8fa31e80e6d953ee9db16e3b87781ee588d40886c5ff51ce000f3b1bbf7dfabbd105e7fecfe6cfada0ce7974be222743c0672096d5253ca8fef4c33468fd1e51aae7e91f077b0eac11f5b0c85e53b14a9b9139af370794ed00f3a000da3aa438c9035e7cfecc7f6f529515a79dc5dabd88a56b0b7ac895ef1afb0ee25255491b66a29aa79b315d1d2ccab3d367bd956ddee9ab382931f955d60e422201a4841dc3c8db0228470d3a6fdfcdf35d785f4505ece5d3162c3413ae701d023b0c83706108bde6a85fa014a96413ba6a121817d7ec9732fc9a102ddfc3159e17cf2140ba39418c33f7a6c27d5c3c58ce1d43218f6dee2d306f266b3af075572c11175de6d642c2fa327b43fcbf1faed128c7527aa1a4b77f6ea46b44ea1d475a8c74c4bc655ccbdf3bb01be8b001e84a6625adc12f08dde6026463b90e33e3871801d20051d3e8072d27a168d212632046180be7d9085c70d33365cb34eb46b76334a2e3b4312bca546e017c56282969021814e011d7c91b3448a50efe12894a2b1c7a08a4d003bcfb4d54b11c6b70c5a19c559288515ad11fedebe4d44f7e305b40ae49c669fd664e20b42a3755841a69069978c15a173b095ac6fbf359980ec20153f77d8fba774f54bde2da299a595b2d7ff1a986f5a47ff651c1a0903dbf6a95a472d6e6dda1b39b0daae74a2404eda92e70a0e6ba936673e44b808da014cff826bb8e06b9d8e5ea5adb5850cdfcd82089d70a143bab905ebb08fe91948a7f4d2fd7e2dd89a102bd93b872a95f3e804e742b2348249e11cee2408afb3d960681ef67cdbc649019fc55e5d1aacbca6bc1506fde5f27147b9f3681c05a5cab7fa497bf0659ff25d4c1c127297062ced658cd86ec4b071b2c127e10a771e7a753cdf91ad81097afdad1f9637862d0ab616edce1393bb528f9943c498450c46de403374d7ba768c5efbc0fd195acadd1f1a5ec4f8365a1050b3b21a7ca483fcebea1cfacd74e48d3ba78ad6c01aae76de98f99f962790a730d3e6fb8e1cc8bef926694228c412227019d132c758407fb54d8649e1e0f001f9b19611bfd195bc8890b7cf74bb31ef190a0e3b40983eb2864150e03a1611ce60d0998dae86a8bda8058919294e0cc9b4ba4f81f1cb8fba69297250c7f15ca23b1309d56ce00b12e5fc108ad7cbf8c2c44d44c3e8cd3c95ad928115d55fafcd3c68527466b38c6ece1c9b836a29149599fbf8be5a16f2b8572d22f4963cdd96dda4016bb4470caef339b0522d3b81a42db37fb3e229fcc4dccf18f2823b6069a144e9af7a75bf9f8bd436f2eb51142d2409b0d1e6bf7710a85effb0055c8184bf9557744ccec641106a4899070bf2ff5731ca787dff3a141e6d391e17490597d1c5f77ab7e9ae5027a63883ed9663605b051ff8c1462922d8bf7f92c73e7223214fd81f76bf3b4634c03223af81b755e305f33a8617133c4cf22744e4162fe285c679cd71da182ad39c80c8b935bd86c3acafc72f482b3d707f04a3b298a853c81ad76a8bf5a68664c4709fbf35cb77dbecedb84a0e215aed77e41a9942742f2a0291fdccc3cf899530fd3af541fc3e2ce11508f972925af1d7ba0b24aee4ce9b85ac87a7735f99ad292ba0216ed6edc1b6df8895493af4b3da7c6387b08462c01cd8876395025c2dfac695ce4885620966a346ca2632665ca1da33d7dec35be61871ccd68b892f0bf2daef16a44fdfd0dca7ca0b53fbb3a69c42b75db87ca5c17e12d5ef9b79b050fdffe79f21c30345f05c2e00e5f4656714744c17a8e8f2f99fcab83dce8c07620b34564c3dcad01fe14df27a419c5b6092842a590a910808962070df0a13ff2768ecf5b8c8a36a890f9c3ae71f50f6c2cc3c17f04adced5aaaa73de3f8072564d9c12d68c4bb196d9a4c9fc2cb755cd3eb0d5180af36c52872fdad89dfcbaaeaa44659d6ca328e39383ed2950a7555cae6103851060f5d0fc56fc48ea2303a5f7af0e35930779889ea069e52372ec9c21f7af2927d111201cb8b4c69a15c20f1c365542e7f7349b004dfc0559f2bb0efaf109cf47d16c1cb5cda09fa56950082f724455dec735c57ded6cce3c944e05d2ee6702bf33a2c84d1475c111702efed57ef6ff2de5caa584131f4ffeb60568068ef8122008b65482ea0d6a4bf8480399e06609e2bd50dfcaa70b178b5de356661bc39b3cdc18a66765599c14082adc6a82c8b354c09e839d30e9d701a1e316c6187043ebe607430808954239670779cfb5029ad53aa38f37aa269830c1adfe4e36b896bdae8dc6845bac35efe11a91c050ebcd238051aca1cac84c49d1c179c12e92b6f05acb754b306afacad3549f24baeca6d0e8dd309be8c9e0cb9e0a0ba641da27c028440b260559294f9bd928d32bf39275df5ecfeef83d55b8afb4998d5defe96a3af9d4b4201ac842429c0e0edea05ddf1bb42a3e064d4", 0x1000, 0x6}, {&(0x7f0000000240)="49f3", 0x2}, {&(0x7f0000000300)="63f10a88ce07df02e1fce3645adca64c0cb5ca6aba762077411cc631c8948a01488e5147febdc9a76295cbeb756afdd626e02113d2de3e6186bc256e76473c01e4ea", 0x42, 0x10001}, {&(0x7f0000000740)="0e4160ecbcf4294a085f8944b2f1cb664ba9fd39eaca6f2f6b48262602c1a5658caf8a3917fbd88c114767d29646a4d7be32e03710137dea183ab7c736ab07bdb6373404fa5a723ca03068c664400eb0eb8d8b8ed89c44808907a2f3126f36c6f0edeecffca4", 0x66, 0x3}, {&(0x7f0000005680)="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", 0x1000, 0x7}], 0x1000002, &(0x7f00000009c0)={[{@user_subvol_rm='user_subvol_rm_allowed'}], [{@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, '127.0.0.1\x00'}}, {@uid_gt={'uid>', r6}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fowner_eq={'fowner', 0x3d, r8}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@audit='audit'}]}) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r9) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:08 executing program 5: 20:50:09 executing program 0: 20:50:09 executing program 2: 20:50:09 executing program 1: 20:50:09 executing program 5: 20:50:09 executing program 2: 20:50:09 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000ffad9f29cfe2de03106aba2fbc2e0002c487463ce5383fa59d7b04b13b1ed30d043936649cc96cea583432ab79a2cd21fadcec56c366"], 0x1}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000380)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2=0xff010000, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0xc0}, 0x8}, 0x0) 20:50:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x12) 20:50:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 20:50:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) close(r0) 20:50:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031ae85717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000002c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) 20:50:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000001c40), 0x2) ioctl(r1, 0x20100000008912, &(0x7f0000000140)="0a5c2d0240316285717070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x389756b1353686c0, 0x120, 0x0, 0xffffffffffffffeb) sendto$inet(r0, &(0x7f0000000080)="89", 0x1, 0x41, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) 20:50:09 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) 20:50:09 executing program 5: 20:50:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) r2 = request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={0x0, r1, r2}, &(0x7f0000000600)=""/152, 0x98, &(0x7f00000006c0)={&(0x7f0000000580)={'wp256-generic\x00'}}) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000240)) 20:50:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:10 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x2000000000008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 20:50:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x414}, 0x7) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8100fffffffe) creat(&(0x7f0000000200)='./bus\x00', 0x0) 20:50:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000080)) 20:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007340)=[{{&(0x7f0000000080)=@vsock, 0x80, &(0x7f00000035c0)=[{&(0x7f0000000300)}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003980)=@un=@abs, 0x80, &(0x7f0000003b80)}}, {{&(0x7f00000069c0)=@pppoe={0x18, 0x0, {0x0, @link_local, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000006a40), 0x0, &(0x7f0000006a80)}}], 0x3, 0x4000) 20:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) [ 1308.381828] audit: type=1804 audit(1541796610.165:176): pid=6391 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir969459921/syzkaller.TRDPxD/1016/file0" dev="sda1" ino=17382 res=1 20:50:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/sockcreate\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 20:50:10 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) fallocate(r0, 0x1, 0x0, 0xd3f4) 20:50:10 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000280)) 20:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:10 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="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", 0x0, 0x0) 20:50:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d62f0"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0xfffffffffffffffd) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) keyctl$session_to_parent(0x12) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x4f) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') 20:50:10 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) write$eventfd(r0, &(0x7f0000000040), 0x8) 20:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)='4', 0x1}], 0x1) fdatasync(0xffffffffffffffff) 20:50:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) ptrace$setopts(0x4205, r1, 0x2, 0xa06ff7) 20:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)='4', 0x1}], 0x1) inotify_init() 20:50:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)='4', 0x1}], 0x1) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x1ff) 20:50:11 executing program 2: 20:50:11 executing program 1: syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60880619004c00000000006e84b5955400000000ffff000000000000000000000000000000000000000000000103000000210420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000"], &(0x7f0000000000)) 20:50:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 20:50:11 executing program 5: 20:50:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:11 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='ip_vti0\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:11 executing program 5: 20:50:11 executing program 0: 20:50:11 executing program 1: 20:50:11 executing program 5: clone(0x1b102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000fa6000/0x1000)=nil, 0x1000, 0x3, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000a20000)={0x0, 0x0, &(0x7f0000000300)=ANY=[]}) 20:50:11 executing program 2: 20:50:11 executing program 0: 20:50:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000004c0)={0x0, 0x2, 0x1}) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:11 executing program 0: 20:50:11 executing program 2: 20:50:11 executing program 5: clone(0x1b102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000fa6000/0x1000)=nil, 0x1000, 0x3, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000a20000)={0x0, 0x0, &(0x7f0000000300)=ANY=[]}) [ 1309.942434] binder: binder_mmap: 6489 20fa6000-20fa7000 bad vm_flags failed -1 20:50:11 executing program 1: 20:50:11 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xffffff8d) sendto$unix(r0, &(0x7f0000000300)="270e21ebdb60d2bed2a9756458489cacf9fdd840eed3873927ba3b4398735a1695846d622fcd9f0112b9b6cc3be2f807c20b3ba86043786d5c7821219b5afb442f496c8ea57fca02e4b1068591e55ed4268475f9f1a754f61b7153b1d57b248c187ed7323f5162904cd41012e61cd6f274da360e96770d75", 0x78, 0x40000, &(0x7f0000000740)=@abs={0x0, 0x0, 0x4e20}, 0x6e) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)=0x20) 20:50:11 executing program 5: clone(0x1b102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000fa6000/0x1000)=nil, 0x1000, 0x3, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000a20000)={0x0, 0x0, &(0x7f0000000300)=ANY=[]}) 20:50:11 executing program 1: 20:50:11 executing program 0: 20:50:11 executing program 2: 20:50:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:12 executing program 0: 20:50:12 executing program 1: 20:50:12 executing program 5: clone(0x1b102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000fa6000/0x1000)=nil, 0x1000, 0x3, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000a20000)={0x0, 0x0, &(0x7f0000000300)=ANY=[]}) 20:50:12 executing program 2: 20:50:12 executing program 0: 20:50:12 executing program 1: 20:50:12 executing program 0: 20:50:12 executing program 5: 20:50:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:12 executing program 2: 20:50:12 executing program 1: 20:50:12 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0x9e1b) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:12 executing program 0: 20:50:12 executing program 2: 20:50:12 executing program 5: 20:50:12 executing program 1: 20:50:12 executing program 0: 20:50:12 executing program 3: request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:13 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2a000000290100040000000b0100001bbfbecb7150625bc7ec1f00010000000000000001000000010000"], 0x2a) r2 = getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, r2}, 0x0, 0x8, 0x3a6}) getsockname(r0, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000180)='./file0/file0\x00'}, 0x2e7) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0xfffffffffffffd61) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x9) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000004680)=""/4096, 0xfffffe16) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) io_setup(0x401, &(0x7f00000001c0)=0x0) io_pgetevents(r8, 0x8ae, 0x9, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:13 executing program 5: 20:50:13 executing program 1: 20:50:13 executing program 2: 20:50:13 executing program 0: 20:50:13 executing program 3: request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz'}, &(0x7f0000000500)=':\x00', 0xffffffffffffffff) clone(0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000000)) 20:50:13 executing program 2: 20:50:13 executing program 0: 20:50:13 executing program 5: 20:50:13 executing program 1: 20:50:13 executing program 0: 20:50:13 executing program 2: 20:50:13 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="9028da54bf17379b93f27f16d18547f30a2f986dde2eb1b4dd3f67b68d289f1476a5432b1e1e46046dbc77bd01113ea2c998d3ccad1bf75d42799f7accc56120000000000000002e198bf0b6336c295addc6c19a314fb8d1db5014ab071d2069cc558dcc7daab6cd9e52c7e91d5a1b0ea65de7ef4ffafb09cee7fecdc0dd317961b10dedab10104d13ca7c152e79ce835c202da8ac4a9932c697f277d558e8b088a6d788a92a1769e9a5215e216c68d2d2d9d278a97f09f780c6e4b2385d73af727cc39a3e130fe1ec2a96175a18dc0cab62e1484fb3dfebd8"]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) fallocate(r2, 0x1, 0x1, 0x100000001) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:13 executing program 0: 20:50:13 executing program 1: 20:50:13 executing program 3: 20:50:13 executing program 2: 20:50:13 executing program 3: 20:50:13 executing program 1: 20:50:13 executing program 0: 20:50:14 executing program 5: clone(0x0, &(0x7f0000000400), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000080)) semctl$IPC_RMID(0x0, 0x0, 0x0) 20:50:14 executing program 1: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$P9_RLINK(r1, &(0x7f0000000100)={0x7, 0x47, 0xffffffffffffffff}, 0xffffffffffffffd2) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$P9_RSTATu(r2, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32]], 0x4451417f) fsync(r2) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000440)=0x80040) ftruncate(r1, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x80, 0x1, 0x6}}, 0x14) 20:50:14 executing program 2: 20:50:14 executing program 3: 20:50:14 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = userfaultfd(0x800) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r5, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r4, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r6}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) write$P9_RWSTAT(r3, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0xb507f40e53fac5ad) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r7) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:14 executing program 0: 20:50:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$link(0x8, 0x0, 0x0) 20:50:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000049b840572137291be10eebf000ee9a90f798058439ed5e901d2da758d5d02acc7edbcd7a071fb35331ce3e8f5eb845f06c2b4833f0f849356f039192806008f7ce66c728841041afe57059503eb5a7819e56e5180b49acad4596489f4455f2cba58ee6d298147dfab3256c742c1b69f67793dfd6a9b4db888e646223be7fb2717202ea956118f193fb84166c236fdaf9716ed51bd15d81d43b89e1cecabcba5d2e62f5b3ec8afedae871218ff070000000000001db98e5856f17a930fe864295da8aebc0f7f7f5680e4d3f7ade21a2d3e420b35456180b109549e4ef0e1b55691030039ce36a24837297a9b9f7a674b065f6f33f00100f484f04d8bba268991d364ec5ac138ba2e24b593336c3ff516b1e93d9ab7460d2a89938fb7600936d99b6a7926ddfb27e09600c50344716a41fd12d60b051d15119f710a0800000000000000000000000000") fgetxattr(r2, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000200)=""/2, 0x135) 20:50:14 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) sendto$unix(r0, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000080)=0x75, 0x2f) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) [ 1312.841476] IPVS: ftp: loaded support on port[0] = 21 20:50:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6400) 20:50:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000100)='\x00') 20:50:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={'bridge0\x00', &(0x7f0000000080)=@ethtool_coalesce={0xf}}) [ 1315.730512] device bridge_slave_1 left promiscuous mode [ 1315.736083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1315.790515] device bridge_slave_0 left promiscuous mode [ 1315.795975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1317.877469] team0 (unregistering): Port device team_slave_1 removed [ 1317.887460] team0 (unregistering): Port device team_slave_0 removed [ 1317.897125] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1317.944107] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1318.019950] bond0 (unregistering): Released all slaves [ 1318.095325] bridge0: port 1(bridge_slave_0) entered blocking state [ 1318.101791] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.108728] device bridge_slave_0 entered promiscuous mode [ 1318.139279] bridge0: port 2(bridge_slave_1) entered blocking state [ 1318.145995] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.152939] device bridge_slave_1 entered promiscuous mode [ 1318.182107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1318.209911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1318.319384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1318.365866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1318.595568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1318.603151] team0: Port device team_slave_0 added [ 1318.648805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1318.656313] team0: Port device team_slave_1 added [ 1318.703850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1318.754932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1318.808524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1318.815790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1318.832877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1318.874021] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1318.881733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1318.898952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1319.384929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.391347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.397925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.404344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.412130] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1320.169837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1320.502088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1320.592742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1320.684248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1320.691348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1320.698379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1320.789198] 8021q: adding VLAN 0 to HW filter on device team0 20:50:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 20:50:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="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") fgetxattr(r2, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000200)=""/2, 0x135) 20:50:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x8, {0x2, 0x0, @local}, "6c6f000000000000dc801566345ec796"}) 20:50:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 20:50:23 executing program 0: semop(0x0, &(0x7f0000000040)=[{0x0, 0xf}], 0x1) semop(0x0, &(0x7f000001a000)=[{}], 0x1) clone(0x0, &(0x7f0000000400), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000080)) semctl$IPC_RMID(0x0, 0x0, 0x0) 20:50:23 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) getsockname(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x80) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB]) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) userfaultfd(0x802) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) fcntl$setflags(r4, 0x2, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x20bfe000, 0x811, r3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffed3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xfffffffffffffe69) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x0, 0x6}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000008c0)=r6) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000800)) 20:50:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000001680)={r0, &(0x7f00000015c0)}, 0x10) 20:50:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={'ip_vti0\x00', 0x201e}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={"69705f76746930000400", 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, 0x0, r3}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000400)={@ipv4={[], [], @remote}}, 0x14) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r2) 20:50:23 executing program 2: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000140)="2d2d624014000000", 0x0) 20:50:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x1f00000000000000, 'memory'}]}, 0x200600) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000600)='syz1\x00', 0x1ff) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, r2, 0x0, 0x3, &(0x7f0000000500)='!/\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000040000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x2, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x68428efa, 0xf2f, 0xc00000000, 0x6, 0x0, 0xffffffffffff3a46, 0x20, 0x2, 0xfff, 0x2, 0x9, 0x5, 0x6, 0x687e, 0x2, 0x5ff6, 0x0, 0x0, 0x7f, 0x0, 0x59, 0x9, 0x7, 0x2, 0x800, 0x0, 0x7, 0x0, 0x5, 0xfffffffffffffedc, 0x10001, 0x0, 0x64c9, 0x0, 0x3f, 0x9, 0x0, 0x100000000, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x31, 0x6, 0x7, 0xca4, 0x6}, 0xffffffffffffffff, 0x0, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) 20:50:23 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f00000006c0)=@pppol2tpv3, 0x80, &(0x7f0000000780)}, 0x0) 20:50:23 executing program 1: rt_sigpending(&(0x7f0000000200), 0xc00480e59fe7c35a) 20:50:23 executing program 2: r0 = memfd_create(&(0x7f0000000c00)="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", 0x0) syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x8}, 0x28, 0x2) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000a40)="bd", 0x1) tee(r3, r2, 0x3, 0x0) tkill(0x0, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioprio_get$pid(0x2000000000000002, 0x0) accept$unix(r3, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 20:50:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) 20:50:23 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x200000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x5, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000440), &(0x7f0000000500)=[{}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'bridge_slave_1\x00', 'team0\x00', 'tunl0\x00', 'sit0\x00', @local, [], @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{{{0x0, 0x0, 0x19, 'team_slave_1\x00', 'bridge_slave_0\x00', 'team0\x00', 'bridge0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x28d4}}}}]}]}, 0x248) r2 = dup(r0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000dc0)={0x3b, @empty, 0x4e23, 0x4, 'dh\x00', 0x4, 0x1, 0x43}, 0x2c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) ioctl$FICLONE(r0, 0x40049409, r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x20000000000000}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000480), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000000000fcdbdf2508"], 0x1}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000340)=""/92) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:50:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev, 0x0, r1}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 20:50:23 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x69, 0x0, 0x0, 0x1}, 0xf) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0xffffff97}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 1322.029323] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 1322.063061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 20:50:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x69, 0x0, 0x0, 0x1}, 0xf) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0xffffff97}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 1322.065849] audit: type=1804 audit(1541796623.845:177): pid=6950 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir021013725/syzkaller.hP2q4V/2/memory.events" dev="sda1" ino=17391 res=1 [ 1322.124906] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1322.132773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 20:50:24 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) [ 1322.500040] audit: type=1804 audit(1541796624.275:178): pid=6989 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir021013725/syzkaller.hP2q4V/2/memory.events" dev="sda1" ino=17391 res=1 20:50:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x1f00000000000000, 'memory'}]}, 0x200600) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000600)='syz1\x00', 0x1ff) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, r2, 0x0, 0x3, &(0x7f0000000500)='!/\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000040000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x2, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x68428efa, 0xf2f, 0xc00000000, 0x6, 0x0, 0xffffffffffff3a46, 0x20, 0x2, 0xfff, 0x2, 0x9, 0x5, 0x6, 0x687e, 0x2, 0x5ff6, 0x0, 0x0, 0x7f, 0x0, 0x59, 0x9, 0x7, 0x2, 0x800, 0x0, 0x7, 0x0, 0x5, 0xfffffffffffffedc, 0x10001, 0x0, 0x64c9, 0x0, 0x3f, 0x9, 0x0, 0x100000000, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x31, 0x6, 0x7, 0xca4, 0x6}, 0xffffffffffffffff, 0x0, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) [ 1322.688489] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 1322.708176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 20:50:24 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) [ 1322.742466] 8021q: adding VLAN 0 to HW filter on device team0 [ 1322.759590] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1322.781231] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 20:50:24 executing program 2: r0 = memfd_create(&(0x7f0000000c00)="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", 0x0) syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x8}, 0x28, 0x2) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000a40)="bd", 0x1) tee(r3, r2, 0x3, 0x0) tkill(0x0, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioprio_get$pid(0x2000000000000002, 0x0) accept$unix(r3, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) [ 1322.819697] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 1322.833904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1322.857937] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 1322.894295] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 1322.921769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1322.928455] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1322.938870] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1322.955884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 20:50:24 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) [ 1323.080727] audit: type=1804 audit(1541796624.855:179): pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir021013725/syzkaller.hP2q4V/3/memory.events" dev="sda1" ino=17391 res=1 20:50:25 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) [ 1323.663546] 8021q: adding VLAN 0 to HW filter on device team0 [ 1323.690993] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1323.703136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 20:50:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) fadvise64(r0, 0x0, 0x0, 0x4) [ 1323.738903] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 1323.769173] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 20:50:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x1f00000000000000, 'memory'}]}, 0x200600) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000600)='syz1\x00', 0x1ff) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, r2, 0x0, 0x3, &(0x7f0000000500)='!/\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000040000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x2, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x68428efa, 0xf2f, 0xc00000000, 0x6, 0x0, 0xffffffffffff3a46, 0x20, 0x2, 0xfff, 0x2, 0x9, 0x5, 0x6, 0x687e, 0x2, 0x5ff6, 0x0, 0x0, 0x7f, 0x0, 0x59, 0x9, 0x7, 0x2, 0x800, 0x0, 0x7, 0x0, 0x5, 0xfffffffffffffedc, 0x10001, 0x0, 0x64c9, 0x0, 0x3f, 0x9, 0x0, 0x100000000, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x31, 0x6, 0x7, 0xca4, 0x6}, 0xffffffffffffffff, 0x0, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) 20:50:25 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000001640)='/dev/ppp\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00', 0x48}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000040)={{}, 'syz1\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSFF(r1, 0x80044584, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 20:50:25 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x8003) listen(r0, 0x6) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x6) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x29, 0x6, 0x0, {0x4, 0x4}}, 0x29) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr=0x5000000}}, 0x80, &(0x7f0000003b80), 0x35b, &(0x7f0000003bc0)}}], 0x3a6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f00000000c0)=""/68, 0xffffffffffffff09) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="6620103f10faeb0bab6d01da8e37503372526c61d583b9bbd09d85fda1445a9ffcb1166123f673eabb805b2e7d4c9b17096217fb7eb37d496e26d24c36", 0x3d) 20:50:25 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) fadvise64(r0, 0x0, 0x0, 0x4) [ 1324.040998] input: syz0 as /devices/virtual/input/input42 [ 1324.119581] input: syz0 as /devices/virtual/input/input43 [ 1324.191394] audit: type=1804 audit(1541796625.975:180): pid=7028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir021013725/syzkaller.hP2q4V/4/memory.events" dev="sda1" ino=17391 res=1 20:50:26 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001d40)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(cipher_null-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) write$binfmt_aout(r2, &(0x7f0000001dc0)=ANY=[@ANYBLOB="070188ffbc0300000c020000ffffff7fa9030000ff0f000000000000000000"], 0x1f) recvmmsg(r2, &(0x7f0000001a80)=[{{&(0x7f0000000f00)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, &(0x7f0000001d00)) 20:50:26 executing program 3: 20:50:26 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:26 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x8003) listen(r0, 0x6) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x6) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={0x29, 0x6, 0x0, {0x4, 0x4}}, 0x29) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr=0x5000000}}, 0x80, &(0x7f0000003b80), 0x35b, &(0x7f0000003bc0)}}], 0x3a6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f00000000c0)=""/68, 0xffffffffffffff09) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="6620103f10faeb0bab6d01da8e37503372526c61d583b9bbd09d85fda1445a9ffcb1166123f673eabb805b2e7d4c9b17096217fb7eb37d496e26d24c36", 0x3d) 20:50:26 executing program 3: 20:50:26 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:26 executing program 1: 20:50:27 executing program 3: 20:50:27 executing program 0: 20:50:27 executing program 5: 20:50:27 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) fadvise64(r0, 0x0, 0x0, 0x4) 20:50:27 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) pread64(0xffffffffffffffff, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:27 executing program 1: 20:50:27 executing program 3: 20:50:27 executing program 1: 20:50:27 executing program 0: 20:50:27 executing program 5: 20:50:27 executing program 3: 20:50:27 executing program 1: 20:50:27 executing program 5: 20:50:27 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:28 executing program 1: 20:50:28 executing program 3: 20:50:28 executing program 0: 20:50:28 executing program 5: 20:50:28 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:28 executing program 2: 20:50:28 executing program 1: 20:50:28 executing program 0: 20:50:28 executing program 3: 20:50:28 executing program 5: 20:50:28 executing program 0: 20:50:28 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:28 executing program 3: 20:50:28 executing program 1: 20:50:28 executing program 0: 20:50:28 executing program 5: 20:50:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000680)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf61a2d0d9174156b724989fdab81f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979880d5462136be93426485f99f87998f48ad7ffa29bda080fa01b70d252407218fad612e074583416711ec1053ba40f66809a95171a9") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) 20:50:28 executing program 3: 20:50:28 executing program 1: 20:50:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mlockall(0x2) 20:50:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000001c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xc4}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x5}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 20:50:28 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:28 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20071026}, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) 20:50:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") time(&(0x7f0000000000)) 20:50:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 20:50:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) 20:50:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @broadcast}, {0x0, @broadcast}, 0x8, {0x2, 0x0, @multicast1}, 'lo\x00'}) 20:50:28 executing program 3: writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="00e9cc81", 0x4}], 0x1) rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffff7}, 0x0, 0x8) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:50:28 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:28 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:28 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:28 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000005c00), 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) 20:50:29 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:29 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:29 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="0003000000000000c91000000000000000000000110000010708000000000000000000000000c45cb482294433fa2b4d6a219ae6d8a9e329482eefcfe5be0c545afbf31bd055c6f5dca461f878baed80796e3c9a0fdafb13261ea9051cd7956d6cc36f55c0674acacee2486f90a3ee91383677e53862f2f6"], 0x1) write(r0, &(0x7f0000000580)="7e8db3f223af2081e287cdf8b690400752768073767a0950010400006bc729e9daf7a92e3014e1", 0x27) read(r0, &(0x7f0000000440)=""/157, 0x130) 20:50:29 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000002c0)) 20:50:29 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000280)={0x0, {{0x2, 0x0, @multicast1}}, 0x0, 0x185}, 0x90) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x0, @dev, 0x0, 0x0, 'dh\x00'}, {@dev}}, 0x44) 20:50:31 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:31 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) write$P9_RSTATu(r0, &(0x7f00000018c0)={0x84, 0x7d, 0x0, {{0x0, 0x5e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '])#procvmnet0self}', 0x11, '/dev/vga_arbiter\x00', 0x4, 'nbd\x00', 0x4, 'nbd\x00'}, 0x11, '/dev/vga_arbiter\x00'}}, 0x84) 20:50:31 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_netdev_private(r0, 0x0, &(0x7f0000000000)) 20:50:31 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xa440, 0x0) 20:50:32 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:32 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:32 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:32 executing program 0: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x0, 0x2}) 20:50:32 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) [ 1330.416493] audit: type=1804 audit(1541796632.195:181): pid=7255 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir999069071/syzkaller.OEt892/657/file0/bus" dev="sda1" ino=17437 res=1 [ 1330.480575] audit: type=1804 audit(1541796632.195:182): pid=7255 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir999069071/syzkaller.OEt892/657/file0/bus" dev="sda1" ino=17437 res=1 [ 1330.538755] audit: type=1804 audit(1541796632.195:183): pid=7255 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir999069071/syzkaller.OEt892/657/file0/bus" dev="sda1" ino=17437 res=1 20:50:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:50:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/16, 0x10}], 0x1, 0x0) 20:50:32 executing program 5: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:32 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:32 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) [ 1330.647316] IPVS: set_ctl: invalid protocol: 0 172.20.20.0:0 20:50:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:50:32 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x8000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 20:50:32 executing program 5: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:32 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') 20:50:32 executing program 4: clone(0x0, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x104) 20:50:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="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") fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000200)=""/2, 0x0) 20:50:32 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000007c0)}, 0x0) 20:50:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000080)) ioprio_get$uid(0x3, 0x0) 20:50:32 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000001640)='net/fib_triestat\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f0000000300)=""/183, 0xb7}], 0x1, 0x34) 20:50:32 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000007c0)}, 0x0) 20:50:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x9, 0x81, 0x20000000004001, 0x0, 0x0}, 0x2c) 20:50:32 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioprio_get$uid(0x3, 0x0) 20:50:33 executing program 0: 20:50:33 executing program 4: clone(0x0, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 3: 20:50:33 executing program 0: 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 2: 20:50:33 executing program 4: clone(0x0, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:33 executing program 0: 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 3: 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 2: 20:50:33 executing program 0: 20:50:33 executing program 3: 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 0: 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 3: 20:50:33 executing program 2: 20:50:33 executing program 0: 20:50:33 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:33 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:33 executing program 2: 20:50:33 executing program 3: 20:50:34 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:34 executing program 0: 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 2: 20:50:34 executing program 3: 20:50:34 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 0: 20:50:34 executing program 2: 20:50:34 executing program 3: 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:34 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:34 executing program 2: 20:50:34 executing program 0: 20:50:34 executing program 3: 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 2: 20:50:34 executing program 3: 20:50:34 executing program 0: 20:50:34 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:34 executing program 2: 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 0: 20:50:34 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(0xffffffffffffffff, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x285, 0x0) 20:50:34 executing program 3: 20:50:34 executing program 2: 20:50:34 executing program 0: 20:50:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:34 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:34 executing program 3: 20:50:35 executing program 0: 20:50:35 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:35 executing program 2: 20:50:35 executing program 4: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000200)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r0, &(0x7f0000000640), 0x2c, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440), &(0x7f0000000600)) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:50:35 executing program 3: 20:50:35 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:35 executing program 2: 20:50:35 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:35 executing program 0: 20:50:35 executing program 3: 20:50:35 executing program 2: 20:50:35 executing program 3: 20:50:35 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:35 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:35 executing program 0: 20:50:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:36 executing program 2: 20:50:36 executing program 3: 20:50:36 executing program 0: 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:36 executing program 4: 20:50:36 executing program 2: 20:50:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:36 executing program 0: 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x414}, 0x7) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8100fffffffe) creat(&(0x7f0000000200)='./bus\x00', 0x0) 20:50:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:36 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', &(0x7f0000000080)='user.syz\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000005000)=""/171, 0xab) 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x4, "55bdea3c"}, &(0x7f0000000080)=0x28) 20:50:36 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', &(0x7f0000000080)='user.syz\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000005000)=""/171, 0xab) 20:50:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00'}, &(0x7f0000000080)=0x24) 20:50:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f7570001d1d0c71815f5e4fb693cdd491015de3a3231a7b2ea83b8c8bb9b6b86a14ef164cdc98f215bb59a25f658ddc64cd22059e80cdf51e752cb0a1f28466", 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000200)='./file1\x00', 0x0) write$P9_ROPEN(r4, &(0x7f0000000700)={0x18}, 0xfffffdd2) lseek(r4, 0x0, 0x4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) timer_gettime(0x0, &(0x7f0000000340)) 20:50:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) semget(0xffffffffffffffff, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file1\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000300)) fallocate(r1, 0x10, 0x0, 0x10000) 20:50:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xb}, 0x1c) 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00'}, &(0x7f0000000080)=0x24) 20:50:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:36 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xa3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x800) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt(r2, 0x1, 0x2, &(0x7f0000008d00)=""/130, &(0x7f0000008dc0)=0x82) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x22}]}, 0x10) flock(r1, 0x8) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) clock_gettime(0x0, &(0x7f0000005180)={0x0, 0x0}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000005140)={0x0, r0, 0xb, 0x1}, 0x14) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000005300)) recvmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000600)=@vsock, 0x80, &(0x7f0000000740)}}, {{&(0x7f0000000780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/242, 0xf2}, {&(0x7f0000000900)=""/238, 0xee}], 0x2, 0x0, 0x0, 0x9}, 0x40}, {{&(0x7f0000000a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000ac0)=""/145, 0x91}, {&(0x7f0000000b80)=""/248, 0xf8}, {&(0x7f0000000c80)=""/29, 0x1d}, {&(0x7f0000000cc0)=""/239, 0xef}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/255, 0xff}, {&(0x7f0000000ec0)=""/57, 0x39}, {&(0x7f0000000f00)=""/130, 0x82}], 0x8, &(0x7f0000001040)=""/20, 0x14}, 0x800}, {{&(0x7f0000001080)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/43, 0x2b}, {&(0x7f0000001140)=""/24, 0x18}], 0x2, &(0x7f00000011c0)=""/150, 0x96, 0xfffffffffffffe00}, 0x200}, {{&(0x7f0000003340)=@xdp, 0x80, &(0x7f0000003500)=[{&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000033c0)=""/151, 0x97}, {&(0x7f0000003480)=""/88, 0x58}], 0x3, &(0x7f0000003540)=""/190, 0xbe, 0x100}, 0x1ff}, {{&(0x7f0000003600)=@nfc, 0x80, &(0x7f0000003800)=[{&(0x7f0000003680)=""/175, 0xaf}, {&(0x7f0000003740)=""/114, 0x72}, {&(0x7f00000037c0)=""/7, 0x7}], 0x3, &(0x7f0000003840)=""/105, 0x69}, 0x10001}, {{&(0x7f00000038c0)=@nfc, 0x80, &(0x7f0000004c80)=[{&(0x7f0000003940)=""/32, 0x20}, {&(0x7f0000003980)=""/216, 0xd8}, {&(0x7f0000003a80)=""/3, 0x3}, {&(0x7f0000003ac0)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/45, 0x2d}, {&(0x7f0000004b00)=""/189, 0xbd}, {&(0x7f0000004bc0)=""/130, 0x82}], 0x7, 0x0, 0x0, 0x2000}, 0x7ff}, {{&(0x7f0000004d00)=@can, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004d80)=""/8, 0x8}, {&(0x7f0000004dc0)=""/228, 0xe4}], 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffe4f0}], 0x8, 0x100, &(0x7f00000051c0)={0x0, r3+30000000}) recvfrom(r2, &(0x7f0000005200)=""/101, 0x63, 0x0, &(0x7f0000005280)=@ax25={0x3, {"5f1b4f9eb63234"}}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000005780)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000005100)={&(0x7f0000001000), 0xc, &(0x7f00000050c0)={&(0x7f00000057c0)=ANY=[]}}, 0x2000c800) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000005380)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x90) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000005580)={'ah\x00'}, &(0x7f00000055c0)=0x1e) syz_genetlink_get_family_id$team(&(0x7f0000005480)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000005440), 0xc, &(0x7f0000005500)={&(0x7f0000005600)=ANY=[]}}, 0x0) add_key(&(0x7f00000054c0)='keyring\x00', &(0x7f0000005640)={'syz'}, &(0x7f0000005680), 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) connect(r2, &(0x7f00000012c0)=@nl=@unspec, 0x80) 20:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x0, 0x80000000, 0x2, 0x90000000000, 0x2}) fchdir(r0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x525}, 0xfffffffffffffdab) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0x3, 0xfffffffffffffe86) truncate(&(0x7f0000000200)='./file0\x00', 0x7fff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) 20:50:36 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00'}, &(0x7f0000000080)=0x24) 20:50:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6gretap0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0xabd, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip6gre0\x00', 0x10) writev(r0, &(0x7f0000001740)=[{&(0x7f0000000340)='7', 0x1}], 0x1) 20:50:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:37 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x2, "55bd"}, &(0x7f0000000080)=0x26) 20:50:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:37 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xa3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x800) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt(r2, 0x1, 0x2, &(0x7f0000008d00)=""/130, &(0x7f0000008dc0)=0x82) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x22}]}, 0x10) flock(r1, 0x8) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) clock_gettime(0x0, &(0x7f0000005180)={0x0, 0x0}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000005140)={0x0, r0, 0xb, 0x1}, 0x14) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000005300)) recvmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000000600)=@vsock, 0x80, &(0x7f0000000740)}}, {{&(0x7f0000000780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/242, 0xf2}, {&(0x7f0000000900)=""/238, 0xee}], 0x2, 0x0, 0x0, 0x9}, 0x40}, {{&(0x7f0000000a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000ac0)=""/145, 0x91}, {&(0x7f0000000b80)=""/248, 0xf8}, {&(0x7f0000000c80)=""/29, 0x1d}, {&(0x7f0000000cc0)=""/239, 0xef}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/255, 0xff}, {&(0x7f0000000ec0)=""/57, 0x39}, {&(0x7f0000000f00)=""/130, 0x82}], 0x8, &(0x7f0000001040)=""/20, 0x14}, 0x800}, {{&(0x7f0000001080)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/43, 0x2b}, {&(0x7f0000001140)=""/24, 0x18}], 0x2, &(0x7f00000011c0)=""/150, 0x96, 0xfffffffffffffe00}, 0x200}, {{&(0x7f0000003340)=@xdp, 0x80, &(0x7f0000003500)=[{&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000033c0)=""/151, 0x97}, {&(0x7f0000003480)=""/88, 0x58}], 0x3, &(0x7f0000003540)=""/190, 0xbe, 0x100}, 0x1ff}, {{&(0x7f0000003600)=@nfc, 0x80, &(0x7f0000003800)=[{&(0x7f0000003680)=""/175, 0xaf}, {&(0x7f0000003740)=""/114, 0x72}, {&(0x7f00000037c0)=""/7, 0x7}], 0x3, &(0x7f0000003840)=""/105, 0x69}, 0x10001}, {{&(0x7f00000038c0)=@nfc, 0x80, &(0x7f0000004c80)=[{&(0x7f0000003940)=""/32, 0x20}, {&(0x7f0000003980)=""/216, 0xd8}, {&(0x7f0000003a80)=""/3, 0x3}, {&(0x7f0000003ac0)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/45, 0x2d}, {&(0x7f0000004b00)=""/189, 0xbd}, {&(0x7f0000004bc0)=""/130, 0x82}], 0x7, 0x0, 0x0, 0x2000}, 0x7ff}, {{&(0x7f0000004d00)=@can, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004d80)=""/8, 0x8}, {&(0x7f0000004dc0)=""/228, 0xe4}], 0x2, 0x0, 0x0, 0x7}, 0xffffffffffffe4f0}], 0x8, 0x100, &(0x7f00000051c0)={0x0, r3+30000000}) recvfrom(r2, &(0x7f0000005200)=""/101, 0x63, 0x0, &(0x7f0000005280)=@ax25={0x3, {"5f1b4f9eb63234"}}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000005780)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000005100)={&(0x7f0000001000), 0xc, &(0x7f00000050c0)={&(0x7f00000057c0)=ANY=[]}}, 0x2000c800) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000005380)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x90) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000005580)={'ah\x00'}, &(0x7f00000055c0)=0x1e) syz_genetlink_get_family_id$team(&(0x7f0000005480)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000005440), 0xc, &(0x7f0000005500)={&(0x7f0000005600)=ANY=[]}}, 0x0) add_key(&(0x7f00000054c0)='keyring\x00', &(0x7f0000005640)={'syz'}, &(0x7f0000005680), 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) connect(r2, &(0x7f00000012c0)=@nl=@unspec, 0x80) 20:50:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) inotify_init() 20:50:37 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x2, "55bd"}, &(0x7f0000000080)=0x26) 20:50:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl=@proc={0x10, 0x800000000000000}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000200080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1, &(0x7f00000007c0)}, 0x0) 20:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) unshare(0x400) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:37 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)) 20:50:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00') 20:50:37 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x2, "55bd"}, &(0x7f0000000080)=0x26) 20:50:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x803, 0x5) unshare(0x400) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:37 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000340), 0x3dc, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x0) recvmmsg(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000d80)}}], 0x1, 0x10002, &(0x7f0000000080)) 20:50:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @rand_addr=0x2}, @in={0x2, 0x4e20}, @in={0x2, 0x4e24, @multicast1}], 0x30) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10150, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a35000/0x400000)=nil, 0x400000, 0x1000006, 0x2013, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000003c0)=""/209, &(0x7f00000000c0)=0x21a) mmap(&(0x7f0000acb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 20:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b7000000000000009500000500000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x803, 0x5) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:38 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x3, "55bdea"}, &(0x7f0000000080)=0x27) 20:50:38 executing program 5: unshare(0x2000400) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/cgroup\x00') setns(r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400200, 0x0) 20:50:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000180), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) 20:50:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000400), 0x4) 20:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 20:50:38 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x3, "55bdea"}, &(0x7f0000000080)=0x27) 20:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x0) r2 = dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)) 20:50:39 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000080)=0xffffff9f) 20:50:39 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001080)={'filter\x00', 0x3, "55bdea"}, &(0x7f0000000080)=0x27) 20:50:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x200100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000340)='dummy0\x00') timer_create(0x0, &(0x7f0000000140)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f00000000c0)) timer_settime(0x0, 0x10000000000019, &(0x7f0000000100)={{}, {0x0, 0x1c9c380}}, 0x0) 20:50:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) munmap(&(0x7f0000590000/0x3000)=nil, 0x3000) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000140)) 20:50:39 executing program 0: r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x40000000011, r1, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) 20:50:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42c00) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xbb909ca80c010000]}}, 0x1c) close(r0) 20:50:39 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1338.046885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:50:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 20:50:40 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x820000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000000)="240000001a0025e0046bbc04fef70f1c020b49ff00000000801108000800100001000000", 0x24) 20:50:40 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 20:50:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 5: 20:50:41 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 20:50:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x545d, 0xfffffffffffffffe) 20:50:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 4: 20:50:41 executing program 5: 20:50:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:41 executing program 1: 20:50:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 20:50:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xf, 0xffffffffffffffff, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000003c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/23, 0x129, 0x17}, 0x20) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003c00)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @multicast1}}}, 0x80, &(0x7f0000003a80), 0x0, &(0x7f0000003b40), 0x0, 0x20000000}, 0x80) write$cgroup_int(r3, &(0x7f0000000000)=0x8, 0x335) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x919) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) close(r3) 20:50:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 5: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x8, 0x209e22, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='pids.current\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 20:50:41 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 20:50:41 executing program 4: 20:50:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 4: 20:50:41 executing program 0: removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 20:50:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:41 executing program 4: 20:50:42 executing program 5: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x8, 0x209e22, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='pids.current\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 20:50:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:42 executing program 0: 20:50:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:42 executing program 1: 20:50:42 executing program 4: 20:50:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:42 executing program 4: 20:50:42 executing program 0: 20:50:42 executing program 1: 20:50:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:42 executing program 5: 20:50:42 executing program 0: 20:50:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000c40)={@loopback}, 0x14) 20:50:42 executing program 4: 20:50:42 executing program 1: 20:50:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:42 executing program 0: 20:50:42 executing program 2: 20:50:42 executing program 1: 20:50:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:42 executing program 4: 20:50:42 executing program 5: 20:50:42 executing program 0: 20:50:43 executing program 2: 20:50:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:43 executing program 4: 20:50:43 executing program 1: 20:50:43 executing program 5: 20:50:43 executing program 4: 20:50:43 executing program 0: 20:50:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000950000050000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:43 executing program 2: 20:50:43 executing program 1: 20:50:43 executing program 4: 20:50:43 executing program 5: 20:50:43 executing program 0: 20:50:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000950000050000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:43 executing program 2: 20:50:43 executing program 1: 20:50:43 executing program 4: 20:50:43 executing program 5: 20:50:43 executing program 0: 20:50:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b700000000000000950000050000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:43 executing program 0: 20:50:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(r0, &(0x7f0000000300), 0x1000) 20:50:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat\x00') read$FUSE(r0, &(0x7f0000000300), 0x1000) 20:50:43 executing program 5: 20:50:43 executing program 1: 20:50:43 executing program 0: 20:50:43 executing program 5: 20:50:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)) 20:50:43 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$eventfd(r0, &(0x7f00000000c0), 0x8) 20:50:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) 20:50:43 executing program 0: pipe(&(0x7f0000000140)) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000001640)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:50:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter\x00') read$FUSE(r0, &(0x7f0000000300), 0x1000) 20:50:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6d6170730022bf41ef7074a57b9072d857c584d9f63a1cd3c6fdb38b76f02fd1810b8e48111d36567fd9b79d1790481d52af2e9b023fe303507a9c00513922c8f8776c") read$FUSE(r0, &(0x7f0000000300), 0x1000) 20:50:44 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000000480), &(0x7f0000000140)) 20:50:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0xffffffaa) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x220048047, &(0x7f00000001c0), 0x10) 20:50:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0x9, 0x210000) ioctl$KDSKBLED(r1, 0x4b65, 0x6161) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)=ANY=[@ANYBLOB="e000004269268faa01000000010000007f000001ffff05ffac14df63947e7d14bb"], 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) fdatasync(r0) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x220048047, &(0x7f00000001c0)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='reno\x00', 0x5) shutdown(r0, 0x1) 20:50:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xf, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="6a0af8ff00000000bfa100000000000007010000f8ffffffb7020000020000f6bc120000000000008500000006000000b70000000000000095000005000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:50:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000680)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf61a2d0d9174156b724989fdab81f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979880d5462136be93426485f99f87998f48ad7ffa29bda080fa01b70d252407218fad612e074583416711ec1053ba40f66809a95171a9") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0xfe9, 0x0) 20:50:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) [ 1342.564154] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:50:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001fc0)={"73797a5f74756e0000000000f3ffffff", 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r3, 0x3, 0x6, @local}, 0x10) dup3(r1, r2, 0x0) 20:50:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000180), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x200000000001f6) 20:50:44 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:50:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) 20:50:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) dup2(r1, r0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000140)=""/161) [ 1342.850501] device syz_tun entered promiscuous mode 20:50:44 executing program 4: r0 = socket$unix(0x1, 0x100000000000005, 0x0) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f00000001c0)) [ 1342.888019] device syz_tun left promiscuous mode 20:50:44 executing program 0: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x8010000101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 20:50:44 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c2d023c126285718070") r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x287396a7f262e109, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) [ 1342.975242] device syz_tun entered promiscuous mode [ 1342.990873] device syz_tun left promiscuous mode 20:50:44 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x3f) 20:50:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept(r0, &(0x7f0000001b40)=@hci, &(0x7f0000000140)=0x80) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, r2+10000000}}, &(0x7f0000000040)) tkill(r1, 0x1004000000016) 20:50:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000040)="b9800000c00f3235001000000f30f24c0f2c49e8426dc4027d3493b80800003626660f7e676d660f1678b06cc403f9dfbeb70000000bc7442400f5000000c744240284d178bcff1c24f2f347dbe1", 0x4e}], 0x1, 0x48, &(0x7f00000000c0), 0x10000000000003e9) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:50:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) signalfd(r1, &(0x7f0000000040), 0x8) 20:50:45 executing program 2: clone(0x10000000000200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000000200), &(0x7f0000001900)) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000540), &(0x7f00000006c0)) r0 = gettid() open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000002c0)) tkill(r0, 0x1000000000016) [ 1343.457856] BUG: unable to handle kernel paging request at ffff880102162000 [ 1343.464995] PGD be01067 P4D be01067 PUD 196d9f063 PMD 80000001020001e3 [ 1343.471771] Oops: 000b [#1] PREEMPT SMP KASAN [ 1343.476273] CPU: 1 PID: 8068 Comm: syz-executor4 Not tainted 4.20.0-rc1+ #106 [ 1343.483551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.493018] RIP: 0010:mmu_page_zap_pte+0x29e/0x3a0 [ 1343.497977] Code: 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c7 85 58 ff ff ff 00 00 00 00 48 c1 ea 03 80 3c 02 00 0f 85 d4 00 00 00 48 c1 eb 03 <49> c7 45 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 be 01 00 [ 1343.516892] RSP: 0018:ffff88015890f158 EFLAGS: 00010a06 [ 1343.522267] RAX: dffffc0000000000 RBX: 1ffff1002b121e30 RCX: ffffffff8111497b [ 1343.529546] RDX: 1ffff1002042c400 RSI: ffffffff81114a5b RDI: 0000000000000007 [ 1343.536824] RBP: ffff88015890f228 R08: ffff8801a50ee540 R09: ffffed003b5e5b67 [ 1343.544107] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: 1ffff1002b121e2c [ 1343.551387] R13: ffff880102162000 R14: 0000000000000004 R15: 0000000000000000 [ 1343.558671] FS: 000000000293e940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1343.566917] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1343.572809] CR2: ffff880102162000 CR3: 000000016c2f2000 CR4: 00000000001426e0 [ 1343.580082] Call Trace: [ 1343.582672] ? drop_spte+0x220/0x220 [ 1343.586408] ? __lock_is_held+0xb5/0x140 [ 1343.590483] kvm_mmu_prepare_zap_page+0x215/0x1850 [ 1343.595424] ? mark_held_locks+0x130/0x130 [ 1343.599672] ? print_usage_bug+0xc0/0xc0 [ 1343.603752] ? lock_downgrade+0x900/0x900 [ 1343.607906] ? kvm_handle_hva_range+0x780/0x780 [ 1343.612575] ? trace_hardirqs_off+0xb8/0x310 [ 1343.616974] ? kasan_check_read+0x11/0x20 [ 1343.621112] ? __lock_acquire+0x62f/0x4c20 [ 1343.625335] ? __lock_acquire+0x62f/0x4c20 [ 1343.629570] ? zap_class+0x640/0x640 [ 1343.633288] ? print_usage_bug+0xc0/0xc0 [ 1343.637345] ? mark_held_locks+0x130/0x130 [ 1343.641586] ? mark_held_locks+0x130/0x130 [ 1343.645826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1343.651361] ? check_preemption_disabled+0x48/0x280 [ 1343.656370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1343.661947] ? kvm_make_vcpus_request_mask+0x48c/0x5a0 [ 1343.667217] ? gfn_to_pfn_atomic+0x7a0/0x7a0 [ 1343.671633] ? zap_class+0x640/0x640 [ 1343.675336] ? lock_acquire+0x1ed/0x520 [ 1343.679297] ? kvm_mmu_invalidate_zap_all_pages+0x9f/0x7b0 [ 1343.684912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1343.690449] ? check_preemption_disabled+0x48/0x280 [ 1343.695477] ? kvm_make_all_cpus_request+0x82/0xb0 [ 1343.700405] ? kvm_make_vcpus_request_mask+0x5a0/0x5a0 [ 1343.705687] kvm_mmu_invalidate_zap_all_pages+0x348/0x7b0 [ 1343.711222] ? kvm_mmu_zap_collapsible_sptes+0x860/0x860 [ 1343.716713] ? kvm_vcpu_on_spin+0x830/0x830 [ 1343.721039] ? lock_acquire+0x1ed/0x520 [ 1343.725009] ? lock_release+0xa00/0xa00 [ 1343.728978] ? lock_release+0xa00/0xa00 [ 1343.732950] ? trace_hardirqs_on+0x310/0x310 [ 1343.737361] kvm_arch_flush_shadow_all+0x15/0x20 [ 1343.742107] kvm_mmu_notifier_release+0x59/0x90 [ 1343.746776] ? kvm_vcpu_on_spin+0x830/0x830 [ 1343.751143] mmu_notifier_unregister+0x1fa/0x600 [ 1343.755894] ? kvm_vcpu_on_spin+0x830/0x830 [ 1343.760237] ? __mmu_notifier_invalidate_range_start+0x360/0x360 [ 1343.766385] ? __free_pages+0x10a/0x190 [ 1343.770348] ? free_unref_page+0x960/0x960 [ 1343.774595] ? trace_hardirqs_off_caller+0x310/0x310 [ 1343.779714] kvm_put_kvm+0x6c0/0xff0 [ 1343.783435] ? kvm_write_guest_cached+0x40/0x40 [ 1343.788099] ? up_write+0x7b/0x220 [ 1343.791626] ? down_write_nested+0x130/0x130 [ 1343.796067] ? mntput+0x74/0xa0 [ 1343.799362] ? debugfs_remove_recursive+0x40d/0x530 [ 1343.804381] ? fsnotify_first_mark+0x350/0x350 [ 1343.808971] ? debugfs_remove+0x130/0x130 [ 1343.813137] ? kvm_vm_release+0x50/0x50 [ 1343.817123] kvm_vcpu_release+0x7b/0xa0 [ 1343.819930] kobject: 'loop5' (0000000031270147): kobject_uevent_env [ 1343.821112] __fput+0x385/0xa30 [ 1343.827549] kobject: 'loop5' (0000000031270147): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1343.830784] ? get_max_files+0x20/0x20 [ 1343.830800] ? trace_hardirqs_on+0xbd/0x310 [ 1343.830814] ? kasan_check_read+0x11/0x20 [ 1343.830916] ? task_work_run+0x1af/0x2a0 [ 1343.856655] ? trace_hardirqs_off_caller+0x310/0x310 [ 1343.861799] ? filp_close+0x1cd/0x250 [ 1343.865609] ____fput+0x15/0x20 [ 1343.868891] task_work_run+0x1e8/0x2a0 [ 1343.872783] ? task_work_cancel+0x240/0x240 [ 1343.877105] ? copy_fd_bitmaps+0x210/0x210 [ 1343.881341] ? do_syscall_64+0x9a/0x820 [ 1343.885321] exit_to_usermode_loop+0x318/0x380 [ 1343.889903] ? __bpf_trace_sys_exit+0x30/0x30 [ 1343.894403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1343.899941] do_syscall_64+0x6be/0x820 [ 1343.903849] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1343.909216] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1343.914143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1343.918999] ? trace_hardirqs_on_caller+0x310/0x310 [ 1343.924044] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1343.929065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1343.933918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.939108] RIP: 0033:0x411021 [ 1343.942303] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1343.961204] RSP: 002b:00007ffee8a267c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1343.968915] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000411021 [ 1343.976183] RDX: 0000000000000000 RSI: 00000000007308d0 RDI: 0000000000000005 [ 1343.983453] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1343.990732] R10: 00007ffee8a266f0 R11: 0000000000000293 R12: 0000000000000000 [ 1343.997996] R13: 0000000000000001 R14: 0000000000000167 R15: 0000000000000004 [ 1344.005270] Modules linked in: [ 1344.008486] CR2: ffff880102162000 [ 1344.011938] ---[ end trace 1cf8bd3be1803bd2 ]--- [ 1344.016715] RIP: 0010:mmu_page_zap_pte+0x29e/0x3a0 [ 1344.021644] Code: 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c7 85 58 ff ff ff 00 00 00 00 48 c1 ea 03 80 3c 02 00 0f 85 d4 00 00 00 48 c1 eb 03 <49> c7 45 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 be 01 00 [ 1344.040594] RSP: 0018:ffff88015890f158 EFLAGS: 00010a06 [ 1344.045963] RAX: dffffc0000000000 RBX: 1ffff1002b121e30 RCX: ffffffff8111497b [ 1344.053232] RDX: 1ffff1002042c400 RSI: ffffffff81114a5b RDI: 0000000000000007 [ 1344.060508] RBP: ffff88015890f228 R08: ffff8801a50ee540 R09: ffffed003b5e5b67 [ 1344.067772] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: 1ffff1002b121e2c [ 1344.075036] R13: ffff880102162000 R14: 0000000000000004 R15: 0000000000000000 [ 1344.082309] FS: 000000000293e940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1344.090529] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1344.096405] CR2: ffff880102162000 CR3: 000000016c2f2000 CR4: 00000000001426e0 [ 1344.103676] Kernel panic - not syncing: Fatal exception [ 1344.109968] Kernel Offset: disabled [ 1344.113592] Rebooting in 86400 seconds..